Feb 9 19:39:07.043987 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 9 19:39:07.044017 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:39:07.044032 kernel: BIOS-provided physical RAM map: Feb 9 19:39:07.044042 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 9 19:39:07.044052 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 9 19:39:07.044062 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 9 19:39:07.044077 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 9 19:39:07.044088 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 9 19:39:07.044098 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 9 19:39:07.044109 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 9 19:39:07.044120 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 9 19:39:07.044130 kernel: printk: bootconsole [earlyser0] enabled Feb 9 19:39:07.044140 kernel: NX (Execute Disable) protection: active Feb 9 19:39:07.044151 kernel: efi: EFI v2.70 by Microsoft Feb 9 19:39:07.044167 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Feb 9 19:39:07.044179 kernel: random: crng init done Feb 9 19:39:07.044191 kernel: SMBIOS 3.1.0 present. Feb 9 19:39:07.044202 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 19:39:07.044214 kernel: Hypervisor detected: Microsoft Hyper-V Feb 9 19:39:07.044225 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 9 19:39:07.044236 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 9 19:39:07.044248 kernel: Hyper-V: Nested features: 0x1e0101 Feb 9 19:39:07.044261 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 9 19:39:07.044273 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 9 19:39:07.044285 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 9 19:39:07.044296 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 9 19:39:07.044308 kernel: tsc: Detected 2593.905 MHz processor Feb 9 19:39:07.044321 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 9 19:39:07.044333 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 9 19:39:07.044344 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 9 19:39:07.044356 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 9 19:39:07.044410 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 9 19:39:07.044425 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 9 19:39:07.044437 kernel: Using GB pages for direct mapping Feb 9 19:39:07.044449 kernel: Secure boot disabled Feb 9 19:39:07.044461 kernel: ACPI: Early table checksum verification disabled Feb 9 19:39:07.044472 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 9 19:39:07.044483 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044495 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044507 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 19:39:07.044526 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 9 19:39:07.044538 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044551 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044563 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044575 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044588 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044603 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044616 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 19:39:07.044628 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 9 19:39:07.044641 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 9 19:39:07.044653 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 9 19:39:07.044666 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 9 19:39:07.044679 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 9 19:39:07.044692 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 9 19:39:07.044707 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 9 19:39:07.044720 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 9 19:39:07.044732 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 9 19:39:07.044745 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 9 19:39:07.044758 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 9 19:39:07.044770 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 9 19:39:07.044783 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 9 19:39:07.044796 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 9 19:39:07.044809 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 9 19:39:07.044824 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 9 19:39:07.044836 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 9 19:39:07.044849 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 9 19:39:07.044862 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 9 19:39:07.044874 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 9 19:39:07.044887 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 9 19:39:07.044900 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 9 19:39:07.044912 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 9 19:39:07.044925 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 9 19:39:07.044940 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 9 19:39:07.044953 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 9 19:39:07.044965 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 9 19:39:07.044978 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 9 19:39:07.044991 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 9 19:39:07.045004 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 9 19:39:07.045016 kernel: Zone ranges: Feb 9 19:39:07.045029 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 9 19:39:07.045041 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 9 19:39:07.045056 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:39:07.045068 kernel: Movable zone start for each node Feb 9 19:39:07.045081 kernel: Early memory node ranges Feb 9 19:39:07.045094 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 9 19:39:07.045106 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 9 19:39:07.045119 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 9 19:39:07.045132 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 9 19:39:07.045144 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 9 19:39:07.045157 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 9 19:39:07.045172 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 9 19:39:07.045185 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 9 19:39:07.045197 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 9 19:39:07.045210 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 9 19:39:07.045223 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 9 19:39:07.045235 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 9 19:39:07.045248 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 9 19:39:07.045261 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 9 19:39:07.045274 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 9 19:39:07.045289 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 9 19:39:07.045302 kernel: Booting paravirtualized kernel on Hyper-V Feb 9 19:39:07.045315 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 9 19:39:07.045327 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 9 19:39:07.045340 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 9 19:39:07.045353 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 9 19:39:07.045365 kernel: pcpu-alloc: [0] 0 1 Feb 9 19:39:07.045434 kernel: Hyper-V: PV spinlocks enabled Feb 9 19:39:07.045448 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 9 19:39:07.045464 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 9 19:39:07.045477 kernel: Policy zone: Normal Feb 9 19:39:07.045490 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:39:07.045502 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 19:39:07.045515 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 9 19:39:07.045527 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 19:39:07.045540 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 19:39:07.045553 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 9 19:39:07.045569 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 19:39:07.045582 kernel: ftrace: allocating 34475 entries in 135 pages Feb 9 19:39:07.045604 kernel: ftrace: allocated 135 pages with 4 groups Feb 9 19:39:07.045619 kernel: rcu: Hierarchical RCU implementation. Feb 9 19:39:07.045632 kernel: rcu: RCU event tracing is enabled. Feb 9 19:39:07.045646 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 19:39:07.045660 kernel: Rude variant of Tasks RCU enabled. Feb 9 19:39:07.045673 kernel: Tracing variant of Tasks RCU enabled. Feb 9 19:39:07.045686 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 19:39:07.045700 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 19:39:07.045713 kernel: Using NULL legacy PIC Feb 9 19:39:07.045729 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 9 19:39:07.045743 kernel: Console: colour dummy device 80x25 Feb 9 19:39:07.045756 kernel: printk: console [tty1] enabled Feb 9 19:39:07.045770 kernel: printk: console [ttyS0] enabled Feb 9 19:39:07.045783 kernel: printk: bootconsole [earlyser0] disabled Feb 9 19:39:07.045799 kernel: ACPI: Core revision 20210730 Feb 9 19:39:07.045812 kernel: Failed to register legacy timer interrupt Feb 9 19:39:07.045825 kernel: APIC: Switch to symmetric I/O mode setup Feb 9 19:39:07.045839 kernel: Hyper-V: Using IPI hypercalls Feb 9 19:39:07.045852 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Feb 9 19:39:07.045866 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 9 19:39:07.045879 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 9 19:39:07.045892 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 9 19:39:07.045906 kernel: Spectre V2 : Mitigation: Retpolines Feb 9 19:39:07.045919 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 9 19:39:07.045935 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 9 19:39:07.045948 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 9 19:39:07.045962 kernel: RETBleed: Vulnerable Feb 9 19:39:07.045975 kernel: Speculative Store Bypass: Vulnerable Feb 9 19:39:07.045988 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:39:07.046001 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 9 19:39:07.046014 kernel: GDS: Unknown: Dependent on hypervisor status Feb 9 19:39:07.046027 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 9 19:39:07.046041 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 9 19:39:07.046054 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 9 19:39:07.046070 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 9 19:39:07.046083 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 9 19:39:07.046097 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 9 19:39:07.046110 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 9 19:39:07.046123 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 9 19:39:07.046136 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 9 19:39:07.046149 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 9 19:39:07.046163 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 9 19:39:07.046176 kernel: Freeing SMP alternatives memory: 32K Feb 9 19:39:07.046189 kernel: pid_max: default: 32768 minimum: 301 Feb 9 19:39:07.046202 kernel: LSM: Security Framework initializing Feb 9 19:39:07.046215 kernel: SELinux: Initializing. Feb 9 19:39:07.046231 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:39:07.046245 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 9 19:39:07.046258 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 9 19:39:07.046272 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 9 19:39:07.046285 kernel: signal: max sigframe size: 3632 Feb 9 19:39:07.046298 kernel: rcu: Hierarchical SRCU implementation. Feb 9 19:39:07.046312 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 9 19:39:07.046325 kernel: smp: Bringing up secondary CPUs ... Feb 9 19:39:07.046339 kernel: x86: Booting SMP configuration: Feb 9 19:39:07.046352 kernel: .... node #0, CPUs: #1 Feb 9 19:39:07.046376 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 9 19:39:07.046391 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 9 19:39:07.046404 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 19:39:07.046418 kernel: smpboot: Max logical packages: 1 Feb 9 19:39:07.046431 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 9 19:39:07.046444 kernel: devtmpfs: initialized Feb 9 19:39:07.046458 kernel: x86/mm: Memory block size: 128MB Feb 9 19:39:07.046472 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 9 19:39:07.046488 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 19:39:07.046502 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 19:39:07.046515 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 19:39:07.046529 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 19:39:07.046543 kernel: audit: initializing netlink subsys (disabled) Feb 9 19:39:07.046556 kernel: audit: type=2000 audit(1707507545.023:1): state=initialized audit_enabled=0 res=1 Feb 9 19:39:07.046569 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 19:39:07.046583 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 9 19:39:07.046597 kernel: cpuidle: using governor menu Feb 9 19:39:07.046613 kernel: ACPI: bus type PCI registered Feb 9 19:39:07.046626 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 19:39:07.046640 kernel: dca service started, version 1.12.1 Feb 9 19:39:07.046654 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 9 19:39:07.046667 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 19:39:07.046680 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 19:39:07.046694 kernel: ACPI: Added _OSI(Module Device) Feb 9 19:39:07.046707 kernel: ACPI: Added _OSI(Processor Device) Feb 9 19:39:07.046721 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 19:39:07.046736 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 19:39:07.046750 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 19:39:07.046763 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 19:39:07.046777 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 19:39:07.046790 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 19:39:07.046803 kernel: ACPI: Interpreter enabled Feb 9 19:39:07.046817 kernel: ACPI: PM: (supports S0 S5) Feb 9 19:39:07.046830 kernel: ACPI: Using IOAPIC for interrupt routing Feb 9 19:39:07.046844 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 9 19:39:07.046860 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 9 19:39:07.046874 kernel: iommu: Default domain type: Translated Feb 9 19:39:07.046887 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 9 19:39:07.046901 kernel: vgaarb: loaded Feb 9 19:39:07.046914 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 19:39:07.046927 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 19:39:07.046941 kernel: PTP clock support registered Feb 9 19:39:07.046954 kernel: Registered efivars operations Feb 9 19:39:07.046968 kernel: PCI: Using ACPI for IRQ routing Feb 9 19:39:07.046982 kernel: PCI: System does not support PCI Feb 9 19:39:07.046998 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 9 19:39:07.047011 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 19:39:07.047024 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 19:39:07.047038 kernel: pnp: PnP ACPI init Feb 9 19:39:07.047051 kernel: pnp: PnP ACPI: found 3 devices Feb 9 19:39:07.047065 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 9 19:39:07.047079 kernel: NET: Registered PF_INET protocol family Feb 9 19:39:07.047092 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 9 19:39:07.047109 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 9 19:39:07.047122 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 19:39:07.047136 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 19:39:07.047150 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 9 19:39:07.047164 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 9 19:39:07.047177 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:39:07.047191 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 9 19:39:07.047205 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 19:39:07.047218 kernel: NET: Registered PF_XDP protocol family Feb 9 19:39:07.047234 kernel: PCI: CLS 0 bytes, default 64 Feb 9 19:39:07.047247 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 9 19:39:07.047261 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 9 19:39:07.047275 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 9 19:39:07.047289 kernel: Initialise system trusted keyrings Feb 9 19:39:07.047302 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 9 19:39:07.047315 kernel: Key type asymmetric registered Feb 9 19:39:07.047328 kernel: Asymmetric key parser 'x509' registered Feb 9 19:39:07.047341 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 19:39:07.047357 kernel: io scheduler mq-deadline registered Feb 9 19:39:07.047378 kernel: io scheduler kyber registered Feb 9 19:39:07.047389 kernel: io scheduler bfq registered Feb 9 19:39:07.047402 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 9 19:39:07.047414 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 19:39:07.047426 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 9 19:39:07.047439 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 9 19:39:07.047452 kernel: i8042: PNP: No PS/2 controller found. Feb 9 19:39:07.047625 kernel: rtc_cmos 00:02: registered as rtc0 Feb 9 19:39:07.047745 kernel: rtc_cmos 00:02: setting system clock to 2024-02-09T19:39:06 UTC (1707507546) Feb 9 19:39:07.047851 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 9 19:39:07.047868 kernel: fail to initialize ptp_kvm Feb 9 19:39:07.047881 kernel: intel_pstate: CPU model not supported Feb 9 19:39:07.047894 kernel: efifb: probing for efifb Feb 9 19:39:07.047908 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 19:39:07.047921 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 19:39:07.047933 kernel: efifb: scrolling: redraw Feb 9 19:39:07.047949 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 19:39:07.047962 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:39:07.047974 kernel: fb0: EFI VGA frame buffer device Feb 9 19:39:07.047986 kernel: pstore: Registered efi as persistent store backend Feb 9 19:39:07.048002 kernel: NET: Registered PF_INET6 protocol family Feb 9 19:39:07.048018 kernel: Segment Routing with IPv6 Feb 9 19:39:07.048030 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 19:39:07.048042 kernel: NET: Registered PF_PACKET protocol family Feb 9 19:39:07.048054 kernel: Key type dns_resolver registered Feb 9 19:39:07.048070 kernel: IPI shorthand broadcast: enabled Feb 9 19:39:07.048081 kernel: sched_clock: Marking stable (877689200, 44240600)->(1177181100, -255251300) Feb 9 19:39:07.048093 kernel: registered taskstats version 1 Feb 9 19:39:07.048107 kernel: Loading compiled-in X.509 certificates Feb 9 19:39:07.048120 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 9 19:39:07.048134 kernel: Key type .fscrypt registered Feb 9 19:39:07.048147 kernel: Key type fscrypt-provisioning registered Feb 9 19:39:07.048161 kernel: pstore: Using crash dump compression: deflate Feb 9 19:39:07.048177 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 19:39:07.048191 kernel: ima: Allocated hash algorithm: sha1 Feb 9 19:39:07.048204 kernel: ima: No architecture policies found Feb 9 19:39:07.048218 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 9 19:39:07.048232 kernel: Write protecting the kernel read-only data: 28672k Feb 9 19:39:07.048246 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 9 19:39:07.048259 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 9 19:39:07.048276 kernel: Run /init as init process Feb 9 19:39:07.048288 kernel: with arguments: Feb 9 19:39:07.048300 kernel: /init Feb 9 19:39:07.048317 kernel: with environment: Feb 9 19:39:07.048328 kernel: HOME=/ Feb 9 19:39:07.048340 kernel: TERM=linux Feb 9 19:39:07.048352 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 19:39:07.048381 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:39:07.048399 systemd[1]: Detected virtualization microsoft. Feb 9 19:39:07.048413 systemd[1]: Detected architecture x86-64. Feb 9 19:39:07.048429 systemd[1]: Running in initrd. Feb 9 19:39:07.048441 systemd[1]: No hostname configured, using default hostname. Feb 9 19:39:07.048453 systemd[1]: Hostname set to . Feb 9 19:39:07.048467 systemd[1]: Initializing machine ID from random generator. Feb 9 19:39:07.048481 systemd[1]: Queued start job for default target initrd.target. Feb 9 19:39:07.048495 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:39:07.048510 systemd[1]: Reached target cryptsetup.target. Feb 9 19:39:07.048524 systemd[1]: Reached target paths.target. Feb 9 19:39:07.048538 systemd[1]: Reached target slices.target. Feb 9 19:39:07.048555 systemd[1]: Reached target swap.target. Feb 9 19:39:07.048570 systemd[1]: Reached target timers.target. Feb 9 19:39:07.048585 systemd[1]: Listening on iscsid.socket. Feb 9 19:39:07.048599 systemd[1]: Listening on iscsiuio.socket. Feb 9 19:39:07.048614 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 19:39:07.048628 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 19:39:07.048642 systemd[1]: Listening on systemd-journald.socket. Feb 9 19:39:07.048658 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:39:07.048671 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:39:07.048684 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:39:07.048697 systemd[1]: Reached target sockets.target. Feb 9 19:39:07.048709 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:39:07.048723 systemd[1]: Finished network-cleanup.service. Feb 9 19:39:07.048737 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 19:39:07.048750 systemd[1]: Starting systemd-journald.service... Feb 9 19:39:07.048764 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:39:07.048781 systemd[1]: Starting systemd-resolved.service... Feb 9 19:39:07.048799 systemd-journald[183]: Journal started Feb 9 19:39:07.048863 systemd-journald[183]: Runtime Journal (/run/log/journal/6b5e2756f4f841708ed7b2f68a81a1d6) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:39:07.058749 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 19:39:07.057016 systemd-modules-load[184]: Inserted module 'overlay' Feb 9 19:39:07.082889 systemd[1]: Started systemd-journald.service. Feb 9 19:39:07.114810 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 19:39:07.114865 kernel: Bridge firewalling registered Feb 9 19:39:07.114877 kernel: audit: type=1130 audit(1707507547.103:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.104573 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:39:07.117575 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 19:39:07.119588 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 9 19:39:07.121639 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 19:39:07.126470 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 19:39:07.132068 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 19:39:07.148281 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 19:39:07.153603 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 19:39:07.158622 systemd[1]: Starting dracut-cmdline.service... Feb 9 19:39:07.169151 systemd-resolved[185]: Positive Trust Anchors: Feb 9 19:39:07.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.183323 dracut-cmdline[201]: dracut-dracut-053 Feb 9 19:39:07.185569 kernel: audit: type=1130 audit(1707507547.116:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.185598 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 9 19:39:07.205573 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:39:07.205628 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:39:07.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.209350 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 9 19:39:07.260562 kernel: audit: type=1130 audit(1707507547.121:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.260594 kernel: SCSI subsystem initialized Feb 9 19:39:07.260612 kernel: audit: type=1130 audit(1707507547.125:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.210502 systemd[1]: Started systemd-resolved.service. Feb 9 19:39:07.212605 systemd[1]: Reached target nss-lookup.target. Feb 9 19:39:07.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.286480 kernel: audit: type=1130 audit(1707507547.150:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.286536 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 19:39:07.286550 kernel: audit: type=1130 audit(1707507547.157:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.298773 kernel: device-mapper: uevent: version 1.0.3 Feb 9 19:39:07.316100 kernel: audit: type=1130 audit(1707507547.212:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.316164 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 19:39:07.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.325185 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 9 19:39:07.326130 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:39:07.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.333562 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:39:07.346600 kernel: audit: type=1130 audit(1707507547.332:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.357561 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:39:07.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.374405 kernel: audit: type=1130 audit(1707507547.361:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.374473 kernel: Loading iSCSI transport class v2.0-870. Feb 9 19:39:07.391394 kernel: iscsi: registered transport (tcp) Feb 9 19:39:07.415840 kernel: iscsi: registered transport (qla4xxx) Feb 9 19:39:07.415915 kernel: QLogic iSCSI HBA Driver Feb 9 19:39:07.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.444973 systemd[1]: Finished dracut-cmdline.service. Feb 9 19:39:07.448416 systemd[1]: Starting dracut-pre-udev.service... Feb 9 19:39:07.499395 kernel: raid6: avx512x4 gen() 18508 MB/s Feb 9 19:39:07.519396 kernel: raid6: avx512x4 xor() 8332 MB/s Feb 9 19:39:07.539394 kernel: raid6: avx512x2 gen() 17037 MB/s Feb 9 19:39:07.559392 kernel: raid6: avx512x2 xor() 25059 MB/s Feb 9 19:39:07.579385 kernel: raid6: avx512x1 gen() 18411 MB/s Feb 9 19:39:07.599379 kernel: raid6: avx512x1 xor() 25916 MB/s Feb 9 19:39:07.621396 kernel: raid6: avx2x4 gen() 18345 MB/s Feb 9 19:39:07.641379 kernel: raid6: avx2x4 xor() 7918 MB/s Feb 9 19:39:07.661387 kernel: raid6: avx2x2 gen() 18442 MB/s Feb 9 19:39:07.682398 kernel: raid6: avx2x2 xor() 17517 MB/s Feb 9 19:39:07.702395 kernel: raid6: avx2x1 gen() 13899 MB/s Feb 9 19:39:07.722379 kernel: raid6: avx2x1 xor() 19289 MB/s Feb 9 19:39:07.742383 kernel: raid6: sse2x4 gen() 11523 MB/s Feb 9 19:39:07.762380 kernel: raid6: sse2x4 xor() 7242 MB/s Feb 9 19:39:07.789405 kernel: raid6: sse2x2 gen() 12666 MB/s Feb 9 19:39:07.810396 kernel: raid6: sse2x2 xor() 7188 MB/s Feb 9 19:39:07.830394 kernel: raid6: sse2x1 gen() 10832 MB/s Feb 9 19:39:07.854302 kernel: raid6: sse2x1 xor() 5728 MB/s Feb 9 19:39:07.854384 kernel: raid6: using algorithm avx512x4 gen() 18508 MB/s Feb 9 19:39:07.854396 kernel: raid6: .... xor() 8332 MB/s, rmw enabled Feb 9 19:39:07.858482 kernel: raid6: using avx512x2 recovery algorithm Feb 9 19:39:07.879399 kernel: xor: automatically using best checksumming function avx Feb 9 19:39:07.986396 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 9 19:39:07.994347 systemd[1]: Finished dracut-pre-udev.service. Feb 9 19:39:07.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:07.998000 audit: BPF prog-id=7 op=LOAD Feb 9 19:39:07.998000 audit: BPF prog-id=8 op=LOAD Feb 9 19:39:07.999867 systemd[1]: Starting systemd-udevd.service... Feb 9 19:39:08.017384 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 9 19:39:08.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:08.024078 systemd[1]: Started systemd-udevd.service. Feb 9 19:39:08.027366 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 19:39:08.047801 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Feb 9 19:39:08.076937 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 19:39:08.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:08.085160 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:39:08.129678 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:39:08.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:08.183394 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 19:39:08.188388 kernel: hv_vmbus: Vmbus version:5.2 Feb 9 19:39:08.203393 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 19:39:08.224395 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 19:39:08.239390 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 19:39:08.248392 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 19:39:08.254396 kernel: AVX2 version of gcm_enc/dec engaged. Feb 9 19:39:08.258389 kernel: AES CTR mode by8 optimization enabled Feb 9 19:39:08.267643 kernel: scsi host0: storvsc_host_t Feb 9 19:39:08.267865 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 19:39:08.267880 kernel: scsi host1: storvsc_host_t Feb 9 19:39:08.267905 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 19:39:08.277418 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 19:39:08.293384 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 19:39:08.313063 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 19:39:08.313113 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 19:39:08.313299 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 19:39:08.313511 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 19:39:08.318392 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 19:39:08.336212 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 19:39:08.336484 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 19:39:08.340400 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 19:39:08.340600 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 19:39:08.346390 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 19:39:08.353390 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:39:08.358386 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 19:39:08.467601 kernel: hv_netvsc 000d3ab5-4ea1-000d-3ab5-4ea1000d3ab5 eth0: VF slot 1 added Feb 9 19:39:08.490982 kernel: hv_vmbus: registering driver hv_pci Feb 9 19:39:08.491063 kernel: hv_pci 618188c7-bf27-4333-b29b-0ddecdd01b62: PCI VMBus probing: Using version 0x10004 Feb 9 19:39:08.504043 kernel: hv_pci 618188c7-bf27-4333-b29b-0ddecdd01b62: PCI host bridge to bus bf27:00 Feb 9 19:39:08.504244 kernel: pci_bus bf27:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 9 19:39:08.504364 kernel: pci_bus bf27:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 19:39:08.516829 kernel: pci bf27:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 9 19:39:08.526644 kernel: pci bf27:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:39:08.542591 kernel: pci bf27:00:02.0: enabling Extended Tags Feb 9 19:39:08.563893 kernel: pci bf27:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at bf27:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 9 19:39:08.564119 kernel: pci_bus bf27:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 19:39:08.564223 kernel: pci bf27:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 9 19:39:08.661392 kernel: mlx5_core bf27:00:02.0: firmware version: 14.30.1224 Feb 9 19:39:08.712220 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 19:39:08.746392 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (456) Feb 9 19:39:08.766825 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:39:08.823736 kernel: mlx5_core bf27:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 9 19:39:08.839721 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 19:39:08.849050 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 19:39:08.857460 systemd[1]: Starting disk-uuid.service... Feb 9 19:39:08.869575 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 19:39:08.877459 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:39:08.887391 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:39:08.994196 kernel: mlx5_core bf27:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 9 19:39:08.994475 kernel: mlx5_core bf27:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing Feb 9 19:39:09.005396 kernel: hv_netvsc 000d3ab5-4ea1-000d-3ab5-4ea1000d3ab5 eth0: VF registering: eth1 Feb 9 19:39:09.009392 kernel: mlx5_core bf27:00:02.0 eth1: joined to eth0 Feb 9 19:39:09.021393 kernel: mlx5_core bf27:00:02.0 enP48935s1: renamed from eth1 Feb 9 19:39:09.888402 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 19:39:09.888940 disk-uuid[561]: The operation has completed successfully. Feb 9 19:39:09.955144 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 19:39:09.955247 systemd[1]: Finished disk-uuid.service. Feb 9 19:39:09.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:09.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:09.967215 systemd[1]: Starting verity-setup.service... Feb 9 19:39:09.998599 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 9 19:39:10.184069 systemd[1]: Found device dev-mapper-usr.device. Feb 9 19:39:10.192183 systemd[1]: Finished verity-setup.service. Feb 9 19:39:10.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.196979 systemd[1]: Mounting sysusr-usr.mount... Feb 9 19:39:10.271301 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 19:39:10.271078 systemd[1]: Mounted sysusr-usr.mount. Feb 9 19:39:10.274646 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 19:39:10.275358 systemd[1]: Starting ignition-setup.service... Feb 9 19:39:10.279831 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 19:39:10.303624 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:39:10.303840 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:39:10.303853 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:39:10.359024 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 19:39:10.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.362000 audit: BPF prog-id=9 op=LOAD Feb 9 19:39:10.364721 systemd[1]: Starting systemd-networkd.service... Feb 9 19:39:10.383004 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 19:39:10.397559 systemd-networkd[805]: lo: Link UP Feb 9 19:39:10.397568 systemd-networkd[805]: lo: Gained carrier Feb 9 19:39:10.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.398116 systemd-networkd[805]: Enumeration completed Feb 9 19:39:10.399457 systemd[1]: Started systemd-networkd.service. Feb 9 19:39:10.402963 systemd[1]: Reached target network.target. Feb 9 19:39:10.406498 systemd-networkd[805]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:39:10.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.409081 systemd[1]: Starting iscsiuio.service... Feb 9 19:39:10.417423 systemd[1]: Started iscsiuio.service. Feb 9 19:39:10.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.420232 systemd[1]: Starting iscsid.service... Feb 9 19:39:10.431282 iscsid[814]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:39:10.431282 iscsid[814]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 19:39:10.431282 iscsid[814]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 19:39:10.431282 iscsid[814]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 19:39:10.431282 iscsid[814]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 19:39:10.431282 iscsid[814]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 19:39:10.426888 systemd[1]: Started iscsid.service. Feb 9 19:39:10.430653 systemd[1]: Starting dracut-initqueue.service... Feb 9 19:39:10.477585 systemd[1]: Finished ignition-setup.service. Feb 9 19:39:10.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.480679 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 19:39:10.489404 kernel: mlx5_core bf27:00:02.0 enP48935s1: Link up Feb 9 19:39:10.493243 systemd[1]: Finished dracut-initqueue.service. Feb 9 19:39:10.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.497667 systemd[1]: Reached target remote-fs-pre.target. Feb 9 19:39:10.501734 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:39:10.506240 systemd[1]: Reached target remote-fs.target. Feb 9 19:39:10.510816 systemd[1]: Starting dracut-pre-mount.service... Feb 9 19:39:10.519521 systemd[1]: Finished dracut-pre-mount.service. Feb 9 19:39:10.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:10.588213 kernel: hv_netvsc 000d3ab5-4ea1-000d-3ab5-4ea1000d3ab5 eth0: Data path switched to VF: enP48935s1 Feb 9 19:39:10.588452 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:39:10.588797 systemd-networkd[805]: enP48935s1: Link UP Feb 9 19:39:10.591517 systemd-networkd[805]: eth0: Link UP Feb 9 19:39:10.592999 systemd-networkd[805]: eth0: Gained carrier Feb 9 19:39:10.597543 systemd-networkd[805]: enP48935s1: Gained carrier Feb 9 19:39:10.628475 systemd-networkd[805]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:39:11.904824 systemd-networkd[805]: eth0: Gained IPv6LL Feb 9 19:39:12.637917 ignition[822]: Ignition 2.14.0 Feb 9 19:39:12.637930 ignition[822]: Stage: fetch-offline Feb 9 19:39:12.638016 ignition[822]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:12.638058 ignition[822]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:12.744294 ignition[822]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:12.744554 ignition[822]: parsed url from cmdline: "" Feb 9 19:39:12.746005 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 19:39:12.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:12.744560 ignition[822]: no config URL provided Feb 9 19:39:12.774435 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 19:39:12.774474 kernel: audit: type=1130 audit(1707507552.751:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:12.752467 systemd[1]: Starting ignition-fetch.service... Feb 9 19:39:12.744571 ignition[822]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:39:12.744582 ignition[822]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:39:12.744591 ignition[822]: failed to fetch config: resource requires networking Feb 9 19:39:12.745006 ignition[822]: Ignition finished successfully Feb 9 19:39:12.792713 ignition[835]: Ignition 2.14.0 Feb 9 19:39:12.792722 ignition[835]: Stage: fetch Feb 9 19:39:12.792852 ignition[835]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:12.792885 ignition[835]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:12.806635 ignition[835]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:12.806801 ignition[835]: parsed url from cmdline: "" Feb 9 19:39:12.806805 ignition[835]: no config URL provided Feb 9 19:39:12.806810 ignition[835]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 19:39:12.806818 ignition[835]: no config at "/usr/lib/ignition/user.ign" Feb 9 19:39:12.806849 ignition[835]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 19:39:12.900560 ignition[835]: GET result: OK Feb 9 19:39:12.900591 ignition[835]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 19:39:13.004578 ignition[835]: opening config device: "/dev/sr0" Feb 9 19:39:13.004977 ignition[835]: getting drive status for "/dev/sr0" Feb 9 19:39:13.005053 ignition[835]: drive status: OK Feb 9 19:39:13.005096 ignition[835]: mounting config device Feb 9 19:39:13.005129 ignition[835]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure2162209419" Feb 9 19:39:13.027964 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 19:39:13.027233 ignition[835]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure2162209419" Feb 9 19:39:13.027245 ignition[835]: checking for config drive Feb 9 19:39:13.027548 ignition[835]: reading config Feb 9 19:39:13.027917 ignition[835]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure2162209419" Feb 9 19:39:13.028022 ignition[835]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure2162209419" Feb 9 19:39:13.028039 ignition[835]: config has been read from custom data Feb 9 19:39:13.028088 ignition[835]: parsing config with SHA512: c73e3d0157a7df92f63f2822ee038a9df6e0fabbbae99fd2ed2b0b020fdb98e5840b728c7c9ddd41037b0563b3931a7af7e6528f6af0f5a9ebedef3a5af08028 Feb 9 19:39:13.041067 systemd[1]: tmp-ignition\x2dazure2162209419.mount: Deactivated successfully. Feb 9 19:39:13.051484 unknown[835]: fetched base config from "system" Feb 9 19:39:13.051497 unknown[835]: fetched base config from "system" Feb 9 19:39:13.051978 ignition[835]: fetch: fetch complete Feb 9 19:39:13.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.051504 unknown[835]: fetched user config from "azure" Feb 9 19:39:13.085359 kernel: audit: type=1130 audit(1707507553.059:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.051983 ignition[835]: fetch: fetch passed Feb 9 19:39:13.056631 systemd[1]: Finished ignition-fetch.service. Feb 9 19:39:13.052017 ignition[835]: Ignition finished successfully Feb 9 19:39:13.061379 systemd[1]: Starting ignition-kargs.service... Feb 9 19:39:13.091573 ignition[842]: Ignition 2.14.0 Feb 9 19:39:13.091582 ignition[842]: Stage: kargs Feb 9 19:39:13.091748 ignition[842]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:13.091791 ignition[842]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:13.094822 ignition[842]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:13.103750 ignition[842]: kargs: kargs passed Feb 9 19:39:13.103795 ignition[842]: Ignition finished successfully Feb 9 19:39:13.114435 systemd[1]: Finished ignition-kargs.service. Feb 9 19:39:13.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.129350 systemd[1]: Starting ignition-disks.service... Feb 9 19:39:13.131795 kernel: audit: type=1130 audit(1707507553.116:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.137527 ignition[848]: Ignition 2.14.0 Feb 9 19:39:13.137536 ignition[848]: Stage: disks Feb 9 19:39:13.137664 ignition[848]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:13.137690 ignition[848]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:13.140076 ignition[848]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:13.142126 ignition[848]: disks: disks passed Feb 9 19:39:13.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.144602 systemd[1]: Finished ignition-disks.service. Feb 9 19:39:13.167550 kernel: audit: type=1130 audit(1707507553.149:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.142170 ignition[848]: Ignition finished successfully Feb 9 19:39:13.149592 systemd[1]: Reached target initrd-root-device.target. Feb 9 19:39:13.163544 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:39:13.167515 systemd[1]: Reached target local-fs.target. Feb 9 19:39:13.169462 systemd[1]: Reached target sysinit.target. Feb 9 19:39:13.171491 systemd[1]: Reached target basic.target. Feb 9 19:39:13.176293 systemd[1]: Starting systemd-fsck-root.service... Feb 9 19:39:13.222106 systemd-fsck[856]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 9 19:39:13.226322 systemd[1]: Finished systemd-fsck-root.service. Feb 9 19:39:13.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.231601 systemd[1]: Mounting sysroot.mount... Feb 9 19:39:13.245168 kernel: audit: type=1130 audit(1707507553.230:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.253390 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 19:39:13.255052 systemd[1]: Mounted sysroot.mount. Feb 9 19:39:13.256913 systemd[1]: Reached target initrd-root-fs.target. Feb 9 19:39:13.300309 systemd[1]: Mounting sysroot-usr.mount... Feb 9 19:39:13.303959 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 19:39:13.309896 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 19:39:13.309926 systemd[1]: Reached target ignition-diskful.target. Feb 9 19:39:13.318012 systemd[1]: Mounted sysroot-usr.mount. Feb 9 19:39:13.359904 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:39:13.368888 systemd[1]: Starting initrd-setup-root.service... Feb 9 19:39:13.376804 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (866) Feb 9 19:39:13.389804 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:39:13.389883 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:39:13.389904 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:39:13.390677 initrd-setup-root[871]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 19:39:13.403759 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:39:13.410068 initrd-setup-root[897]: cut: /sysroot/etc/group: No such file or directory Feb 9 19:39:13.418889 initrd-setup-root[905]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 19:39:13.428310 initrd-setup-root[913]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 19:39:13.774171 systemd[1]: Finished initrd-setup-root.service. Feb 9 19:39:13.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.780777 systemd[1]: Starting ignition-mount.service... Feb 9 19:39:13.796259 kernel: audit: type=1130 audit(1707507553.779:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.797095 systemd[1]: Starting sysroot-boot.service... Feb 9 19:39:13.819292 systemd[1]: Finished sysroot-boot.service. Feb 9 19:39:13.823716 ignition[932]: INFO : Ignition 2.14.0 Feb 9 19:39:13.823716 ignition[932]: INFO : Stage: mount Feb 9 19:39:13.841351 kernel: audit: type=1130 audit(1707507553.823:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.841457 ignition[932]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:13.841457 ignition[932]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:13.850766 ignition[932]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:13.854622 ignition[932]: INFO : mount: mount passed Feb 9 19:39:13.856871 ignition[932]: INFO : Ignition finished successfully Feb 9 19:39:13.857634 systemd[1]: Finished ignition-mount.service. Feb 9 19:39:13.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:13.874391 kernel: audit: type=1130 audit(1707507553.860:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:14.028750 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 19:39:14.028870 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 19:39:14.412899 coreos-metadata[865]: Feb 09 19:39:14.412 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:39:14.426767 coreos-metadata[865]: Feb 09 19:39:14.426 INFO Fetch successful Feb 9 19:39:14.459890 coreos-metadata[865]: Feb 09 19:39:14.459 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:39:14.475549 coreos-metadata[865]: Feb 09 19:39:14.475 INFO Fetch successful Feb 9 19:39:14.491636 coreos-metadata[865]: Feb 09 19:39:14.491 INFO wrote hostname ci-3510.3.2-a-7a940f9dc1 to /sysroot/etc/hostname Feb 9 19:39:14.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:14.493732 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 19:39:14.499633 systemd[1]: Starting ignition-files.service... Feb 9 19:39:14.511383 kernel: audit: type=1130 audit(1707507554.498:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:14.519607 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 19:39:14.534397 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (944) Feb 9 19:39:14.534445 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 9 19:39:14.541872 kernel: BTRFS info (device sda6): using free space tree Feb 9 19:39:14.541899 kernel: BTRFS info (device sda6): has skinny extents Feb 9 19:39:14.549731 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 19:39:14.562362 ignition[963]: INFO : Ignition 2.14.0 Feb 9 19:39:14.562362 ignition[963]: INFO : Stage: files Feb 9 19:39:14.566521 ignition[963]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:14.566521 ignition[963]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:14.601431 ignition[963]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:14.617199 ignition[963]: DEBUG : files: compiled without relabeling support, skipping Feb 9 19:39:14.620418 ignition[963]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 19:39:14.620418 ignition[963]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 19:39:14.655279 ignition[963]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 19:39:14.659033 ignition[963]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 19:39:14.672947 unknown[963]: wrote ssh authorized keys file for user: core Feb 9 19:39:14.675853 ignition[963]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 19:39:14.675853 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:39:14.675853 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 9 19:39:15.362939 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 19:39:15.569723 ignition[963]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 9 19:39:15.579362 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 9 19:39:15.579362 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:39:15.579362 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 9 19:39:16.063685 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 19:39:16.259935 ignition[963]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 9 19:39:16.269615 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 9 19:39:16.269615 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:39:16.269615 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 9 19:39:16.482808 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 19:39:16.764479 ignition[963]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 9 19:39:16.771906 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 19:39:16.771906 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:39:16.771906 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 9 19:39:16.888179 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 19:39:17.423693 ignition[963]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 19:39:17.431399 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:39:17.457406 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 19:39:17.457406 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:39:17.457406 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:39:17.482564 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1467307627" Feb 9 19:39:17.482564 ignition[963]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1467307627": device or resource busy Feb 9 19:39:17.482564 ignition[963]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1467307627", trying btrfs: device or resource busy Feb 9 19:39:17.482564 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1467307627" Feb 9 19:39:17.504298 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (968) Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1467307627" Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1467307627" Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1467307627" Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:39:17.504329 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 19:39:17.538859 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3611934036" Feb 9 19:39:17.543822 ignition[963]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3611934036": device or resource busy Feb 9 19:39:17.543822 ignition[963]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3611934036", trying btrfs: device or resource busy Feb 9 19:39:17.543822 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3611934036" Feb 9 19:39:17.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.574437 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3611934036" Feb 9 19:39:17.574437 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3611934036" Feb 9 19:39:17.574437 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3611934036" Feb 9 19:39:17.574437 ignition[963]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 19:39:17.574437 ignition[963]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 19:39:17.669896 kernel: audit: type=1130 audit(1707507557.558:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.552882 systemd[1]: Finished ignition-files.service. Feb 9 19:39:17.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.674749 ignition[963]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:39:17.674749 ignition[963]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 19:39:17.674749 ignition[963]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 19:39:17.674749 ignition[963]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 19:39:17.674749 ignition[963]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:39:17.674749 ignition[963]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 19:39:17.674749 ignition[963]: INFO : files: files passed Feb 9 19:39:17.674749 ignition[963]: INFO : Ignition finished successfully Feb 9 19:39:17.578530 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 19:39:17.585910 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 19:39:17.679251 initrd-setup-root-after-ignition[988]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 19:39:17.586799 systemd[1]: Starting ignition-quench.service... Feb 9 19:39:17.590233 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 19:39:17.590329 systemd[1]: Finished ignition-quench.service. Feb 9 19:39:17.670089 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 19:39:17.674779 systemd[1]: Reached target ignition-complete.target. Feb 9 19:39:17.722785 systemd[1]: Starting initrd-parse-etc.service... Feb 9 19:39:17.740445 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 19:39:17.740552 systemd[1]: Finished initrd-parse-etc.service. Feb 9 19:39:17.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.747030 systemd[1]: Reached target initrd-fs.target. Feb 9 19:39:17.750906 systemd[1]: Reached target initrd.target. Feb 9 19:39:17.754929 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 19:39:17.758826 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 19:39:17.769829 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 19:39:17.778390 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 9 19:39:17.778432 kernel: audit: type=1130 audit(1707507557.773:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.778278 systemd[1]: Starting initrd-cleanup.service... Feb 9 19:39:17.798665 systemd[1]: Stopped target nss-lookup.target. Feb 9 19:39:17.804816 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 19:39:17.809913 systemd[1]: Stopped target timers.target. Feb 9 19:39:17.813673 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 19:39:17.816005 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 19:39:17.820000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.820532 systemd[1]: Stopped target initrd.target. Feb 9 19:39:17.832384 kernel: audit: type=1131 audit(1707507557.820:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.836021 systemd[1]: Stopped target basic.target. Feb 9 19:39:17.840102 systemd[1]: Stopped target ignition-complete.target. Feb 9 19:39:17.844626 systemd[1]: Stopped target ignition-diskful.target. Feb 9 19:39:17.851213 systemd[1]: Stopped target initrd-root-device.target. Feb 9 19:39:17.855806 systemd[1]: Stopped target remote-fs.target. Feb 9 19:39:17.859814 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 19:39:17.864169 systemd[1]: Stopped target sysinit.target. Feb 9 19:39:17.867964 systemd[1]: Stopped target local-fs.target. Feb 9 19:39:17.872021 systemd[1]: Stopped target local-fs-pre.target. Feb 9 19:39:17.876305 systemd[1]: Stopped target swap.target. Feb 9 19:39:17.880172 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 19:39:17.882590 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 19:39:17.886000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.886695 systemd[1]: Stopped target cryptsetup.target. Feb 9 19:39:17.898391 kernel: audit: type=1131 audit(1707507557.886:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.902313 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 19:39:17.904669 systemd[1]: Stopped dracut-initqueue.service. Feb 9 19:39:17.908000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.908683 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 19:39:17.908828 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 19:39:17.920939 kernel: audit: type=1131 audit(1707507557.908:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.932427 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 19:39:17.950031 kernel: audit: type=1131 audit(1707507557.931:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.932577 systemd[1]: Stopped ignition-files.service. Feb 9 19:39:17.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.956420 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 19:39:17.956629 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 19:39:17.969389 kernel: audit: type=1131 audit(1707507557.955:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:17.983138 systemd[1]: Stopping ignition-mount.service... Feb 9 19:39:18.002427 kernel: audit: type=1131 audit(1707507557.978:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.002461 ignition[1001]: INFO : Ignition 2.14.0 Feb 9 19:39:18.002461 ignition[1001]: INFO : Stage: umount Feb 9 19:39:18.002461 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 19:39:18.002461 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 19:39:18.002461 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 19:39:18.002461 ignition[1001]: INFO : umount: umount passed Feb 9 19:39:18.002461 ignition[1001]: INFO : Ignition finished successfully Feb 9 19:39:18.033827 kernel: audit: type=1131 audit(1707507558.017:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.002440 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 19:39:18.002657 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 19:39:18.039076 systemd[1]: Stopping sysroot-boot.service... Feb 9 19:39:18.041206 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 19:39:18.041486 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 19:39:18.065586 kernel: audit: type=1131 audit(1707507558.048:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.060194 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 19:39:18.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.060442 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 19:39:18.082678 kernel: audit: type=1131 audit(1707507558.065:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.067001 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 19:39:18.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.067093 systemd[1]: Stopped ignition-mount.service. Feb 9 19:39:18.081835 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 19:39:18.081943 systemd[1]: Stopped ignition-disks.service. Feb 9 19:39:18.095388 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 19:39:18.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.095462 systemd[1]: Stopped ignition-kargs.service. Feb 9 19:39:18.097440 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 19:39:18.097494 systemd[1]: Stopped ignition-fetch.service. Feb 9 19:39:18.099465 systemd[1]: Stopped target network.target. Feb 9 19:39:18.101716 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 19:39:18.101774 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 19:39:18.104218 systemd[1]: Stopped target paths.target. Feb 9 19:39:18.106733 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 19:39:18.106857 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 19:39:18.129068 systemd[1]: Stopped target slices.target. Feb 9 19:39:18.131449 systemd[1]: Stopped target sockets.target. Feb 9 19:39:18.139028 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 19:39:18.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.139070 systemd[1]: Closed iscsid.socket. Feb 9 19:39:18.140694 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 19:39:18.140726 systemd[1]: Closed iscsiuio.socket. Feb 9 19:39:18.142397 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 19:39:18.142448 systemd[1]: Stopped ignition-setup.service. Feb 9 19:39:18.144742 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:39:18.159486 systemd[1]: Stopping systemd-resolved.service... Feb 9 19:39:18.161482 systemd-networkd[805]: eth0: DHCPv6 lease lost Feb 9 19:39:18.163944 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:39:18.164047 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:39:18.173433 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 19:39:18.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.176661 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 19:39:18.179136 systemd[1]: Stopped systemd-resolved.service. Feb 9 19:39:18.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.184542 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 19:39:18.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.184646 systemd[1]: Finished initrd-cleanup.service. Feb 9 19:39:18.191000 audit: BPF prog-id=9 op=UNLOAD Feb 9 19:39:18.191000 audit: BPF prog-id=6 op=UNLOAD Feb 9 19:39:18.192114 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 19:39:18.192159 systemd[1]: Closed systemd-networkd.socket. Feb 9 19:39:18.201481 systemd[1]: Stopping network-cleanup.service... Feb 9 19:39:18.210000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.213000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.203852 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 19:39:18.203928 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 19:39:18.211033 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 19:39:18.211106 systemd[1]: Stopped systemd-sysctl.service. Feb 9 19:39:18.213648 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 19:39:18.213714 systemd[1]: Stopped systemd-modules-load.service. Feb 9 19:39:18.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.216100 systemd[1]: Stopping systemd-udevd.service... Feb 9 19:39:18.223043 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 19:39:18.232595 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 19:39:18.232736 systemd[1]: Stopped systemd-udevd.service. Feb 9 19:39:18.237933 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 19:39:18.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.237979 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 19:39:18.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.240154 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 19:39:18.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.240195 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 19:39:18.244875 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 19:39:18.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.244922 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 19:39:18.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.260560 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 19:39:18.260615 systemd[1]: Stopped dracut-cmdline.service. Feb 9 19:39:18.264657 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 19:39:18.300465 kernel: hv_netvsc 000d3ab5-4ea1-000d-3ab5-4ea1000d3ab5 eth0: Data path switched from VF: enP48935s1 Feb 9 19:39:18.264707 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 19:39:18.270426 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 19:39:18.279468 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 19:39:18.279522 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 19:39:18.283641 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 19:39:18.283740 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 19:39:18.326000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:18.324911 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 19:39:18.325006 systemd[1]: Stopped network-cleanup.service. Feb 9 19:39:19.528916 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 19:39:19.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:19.529043 systemd[1]: Stopped sysroot-boot.service. Feb 9 19:39:19.535524 systemd[1]: Reached target initrd-switch-root.target. Feb 9 19:39:19.543770 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 19:39:19.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:19.543861 systemd[1]: Stopped initrd-setup-root.service. Feb 9 19:39:19.549408 systemd[1]: Starting initrd-switch-root.service... Feb 9 19:39:19.562175 systemd[1]: Switching root. Feb 9 19:39:19.588544 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 9 19:39:19.588649 iscsid[814]: iscsid shutting down. Feb 9 19:39:19.590549 systemd-journald[183]: Journal stopped Feb 9 19:39:30.554884 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 19:39:30.554927 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 19:39:30.554945 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 19:39:30.554960 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 19:39:30.554973 kernel: SELinux: policy capability open_perms=1 Feb 9 19:39:30.554987 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 19:39:30.555002 kernel: SELinux: policy capability always_check_network=0 Feb 9 19:39:30.555017 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 19:39:30.555029 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 19:39:30.555041 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 19:39:30.555054 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 19:39:30.555069 systemd[1]: Successfully loaded SELinux policy in 228.945ms. Feb 9 19:39:30.555084 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 48.582ms. Feb 9 19:39:30.555100 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 19:39:30.555120 systemd[1]: Detected virtualization microsoft. Feb 9 19:39:30.555135 systemd[1]: Detected architecture x86-64. Feb 9 19:39:30.555149 systemd[1]: Detected first boot. Feb 9 19:39:30.555164 systemd[1]: Hostname set to . Feb 9 19:39:30.555179 systemd[1]: Initializing machine ID from random generator. Feb 9 19:39:30.555197 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 19:39:30.555211 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 19:39:30.555227 kernel: audit: type=1400 audit(1707507562.914:87): avc: denied { associate } for pid=1034 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:39:30.555246 kernel: audit: type=1300 audit(1707507562.914:87): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:30.555264 kernel: audit: type=1327 audit(1707507562.914:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:39:30.555284 kernel: audit: type=1400 audit(1707507562.922:88): avc: denied { associate } for pid=1034 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:39:30.555301 kernel: audit: type=1300 audit(1707507562.922:88): arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:30.555318 kernel: audit: type=1307 audit(1707507562.922:88): cwd="/" Feb 9 19:39:30.555335 kernel: audit: type=1302 audit(1707507562.922:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:30.555353 kernel: audit: type=1302 audit(1707507562.922:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:30.557558 kernel: audit: type=1327 audit(1707507562.922:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:39:30.557597 systemd[1]: Populated /etc with preset unit settings. Feb 9 19:39:30.557615 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:39:30.557636 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:39:30.557655 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:39:30.557673 kernel: audit: type=1334 audit(1707507570.005:89): prog-id=12 op=LOAD Feb 9 19:39:30.557690 kernel: audit: type=1334 audit(1707507570.005:90): prog-id=3 op=UNLOAD Feb 9 19:39:30.557708 kernel: audit: type=1334 audit(1707507570.011:91): prog-id=13 op=LOAD Feb 9 19:39:30.557724 kernel: audit: type=1334 audit(1707507570.016:92): prog-id=14 op=LOAD Feb 9 19:39:30.557751 kernel: audit: type=1334 audit(1707507570.016:93): prog-id=4 op=UNLOAD Feb 9 19:39:30.557769 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 19:39:30.557793 kernel: audit: type=1334 audit(1707507570.016:94): prog-id=5 op=UNLOAD Feb 9 19:39:30.557812 kernel: audit: type=1131 audit(1707507570.018:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.557831 systemd[1]: Stopped iscsiuio.service. Feb 9 19:39:30.557851 kernel: audit: type=1334 audit(1707507570.075:96): prog-id=12 op=UNLOAD Feb 9 19:39:30.557871 kernel: audit: type=1131 audit(1707507570.081:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.557895 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 19:39:30.557913 systemd[1]: Stopped iscsid.service. Feb 9 19:39:30.557934 kernel: audit: type=1131 audit(1707507570.103:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.557951 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 19:39:30.557971 systemd[1]: Stopped initrd-switch-root.service. Feb 9 19:39:30.557991 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 19:39:30.558009 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 19:39:30.558028 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 19:39:30.558049 systemd[1]: Created slice system-getty.slice. Feb 9 19:39:30.558066 systemd[1]: Created slice system-modprobe.slice. Feb 9 19:39:30.558084 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 19:39:30.558105 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 19:39:30.558123 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 19:39:30.558142 systemd[1]: Created slice user.slice. Feb 9 19:39:30.558160 systemd[1]: Started systemd-ask-password-console.path. Feb 9 19:39:30.558178 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 19:39:30.558196 systemd[1]: Set up automount boot.automount. Feb 9 19:39:30.558221 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 19:39:30.558239 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 19:39:30.558258 systemd[1]: Stopped target initrd-fs.target. Feb 9 19:39:30.558277 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 19:39:30.558294 systemd[1]: Reached target integritysetup.target. Feb 9 19:39:30.558312 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 19:39:30.558333 systemd[1]: Reached target remote-fs.target. Feb 9 19:39:30.558350 systemd[1]: Reached target slices.target. Feb 9 19:39:30.558387 systemd[1]: Reached target swap.target. Feb 9 19:39:30.558408 systemd[1]: Reached target torcx.target. Feb 9 19:39:30.558428 systemd[1]: Reached target veritysetup.target. Feb 9 19:39:30.558447 systemd[1]: Listening on systemd-coredump.socket. Feb 9 19:39:30.558464 systemd[1]: Listening on systemd-initctl.socket. Feb 9 19:39:30.558482 systemd[1]: Listening on systemd-networkd.socket. Feb 9 19:39:30.558496 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 19:39:30.558510 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 19:39:30.558524 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 19:39:30.558540 systemd[1]: Mounting dev-hugepages.mount... Feb 9 19:39:30.558553 systemd[1]: Mounting dev-mqueue.mount... Feb 9 19:39:30.560164 systemd[1]: Mounting media.mount... Feb 9 19:39:30.560196 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:39:30.560214 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 19:39:30.560236 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 19:39:30.560253 systemd[1]: Mounting tmp.mount... Feb 9 19:39:30.560273 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 19:39:30.560290 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 19:39:30.560307 systemd[1]: Starting kmod-static-nodes.service... Feb 9 19:39:30.560323 systemd[1]: Starting modprobe@configfs.service... Feb 9 19:39:30.560337 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 19:39:30.560352 systemd[1]: Starting modprobe@drm.service... Feb 9 19:39:30.560403 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 19:39:30.560420 systemd[1]: Starting modprobe@fuse.service... Feb 9 19:39:30.560433 systemd[1]: Starting modprobe@loop.service... Feb 9 19:39:30.560447 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 19:39:30.560460 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 19:39:30.560472 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 19:39:30.560485 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 19:39:30.560498 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 19:39:30.560508 systemd[1]: Stopped systemd-journald.service. Feb 9 19:39:30.560524 systemd[1]: Starting systemd-journald.service... Feb 9 19:39:30.560535 kernel: loop: module loaded Feb 9 19:39:30.560546 systemd[1]: Starting systemd-modules-load.service... Feb 9 19:39:30.560560 systemd[1]: Starting systemd-network-generator.service... Feb 9 19:39:30.560572 kernel: fuse: init (API version 7.34) Feb 9 19:39:30.560583 systemd[1]: Starting systemd-remount-fs.service... Feb 9 19:39:30.560595 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 19:39:30.560606 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 19:39:30.560619 systemd[1]: Stopped verity-setup.service. Feb 9 19:39:30.560632 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 9 19:39:30.560645 systemd[1]: Mounted dev-hugepages.mount. Feb 9 19:39:30.560658 systemd[1]: Mounted dev-mqueue.mount. Feb 9 19:39:30.560668 systemd[1]: Mounted media.mount. Feb 9 19:39:30.560681 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 19:39:30.560694 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 19:39:30.560705 systemd[1]: Mounted tmp.mount. Feb 9 19:39:30.560718 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 19:39:30.560742 systemd-journald[1127]: Journal started Feb 9 19:39:30.560804 systemd-journald[1127]: Runtime Journal (/run/log/journal/22c91f17459d4851ad1a75402818e57d) is 8.0M, max 159.0M, 151.0M free. Feb 9 19:39:21.318000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 19:39:21.904000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:39:21.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:39:21.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 19:39:21.916000 audit: BPF prog-id=10 op=LOAD Feb 9 19:39:21.916000 audit: BPF prog-id=10 op=UNLOAD Feb 9 19:39:21.916000 audit: BPF prog-id=11 op=LOAD Feb 9 19:39:21.916000 audit: BPF prog-id=11 op=UNLOAD Feb 9 19:39:22.914000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 19:39:22.914000 audit[1034]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae58 a2=c000029100 a3=32 items=0 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.914000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:39:22.922000 audit[1034]: AVC avc: denied { associate } for pid=1034 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 19:39:22.922000 audit[1034]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=1017 pid=1034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:22.922000 audit: CWD cwd="/" Feb 9 19:39:22.922000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:22.922000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:22.922000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 19:39:30.005000 audit: BPF prog-id=12 op=LOAD Feb 9 19:39:30.005000 audit: BPF prog-id=3 op=UNLOAD Feb 9 19:39:30.011000 audit: BPF prog-id=13 op=LOAD Feb 9 19:39:30.016000 audit: BPF prog-id=14 op=LOAD Feb 9 19:39:30.016000 audit: BPF prog-id=4 op=UNLOAD Feb 9 19:39:30.016000 audit: BPF prog-id=5 op=UNLOAD Feb 9 19:39:30.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.075000 audit: BPF prog-id=12 op=UNLOAD Feb 9 19:39:30.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.446000 audit: BPF prog-id=15 op=LOAD Feb 9 19:39:30.448000 audit: BPF prog-id=16 op=LOAD Feb 9 19:39:30.448000 audit: BPF prog-id=17 op=LOAD Feb 9 19:39:30.448000 audit: BPF prog-id=13 op=UNLOAD Feb 9 19:39:30.448000 audit: BPF prog-id=14 op=UNLOAD Feb 9 19:39:30.514000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.551000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 19:39:30.551000 audit[1127]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffebccfabe0 a2=4000 a3=7ffebccfac7c items=0 ppid=1 pid=1127 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:30.551000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 19:39:22.902794 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:39:30.004324 systemd[1]: Queued start job for default target multi-user.target. Feb 9 19:39:22.903332 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:39:30.018606 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 19:39:22.903354 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:39:22.903413 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 19:39:22.903426 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 19:39:22.903469 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 19:39:22.903484 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 19:39:22.903692 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 19:39:22.903747 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 19:39:22.903764 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 19:39:22.904148 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 19:39:22.904187 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 19:39:22.904208 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 19:39:22.904224 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 19:39:22.904243 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 19:39:22.904258 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 19:39:29.070552 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:39:29.070780 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:39:29.070904 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:39:30.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:29.071065 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 19:39:29.071112 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 19:39:29.071164 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-02-09T19:39:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 19:39:30.570391 systemd[1]: Started systemd-journald.service. Feb 9 19:39:30.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.572785 systemd[1]: Finished kmod-static-nodes.service. Feb 9 19:39:30.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.575231 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 19:39:30.575386 systemd[1]: Finished modprobe@configfs.service. Feb 9 19:39:30.577801 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 19:39:30.577949 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 19:39:30.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.580351 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 19:39:30.580515 systemd[1]: Finished modprobe@drm.service. Feb 9 19:39:30.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.582899 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 19:39:30.583038 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 19:39:30.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.585650 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 19:39:30.585793 systemd[1]: Finished modprobe@fuse.service. Feb 9 19:39:30.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.588240 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 19:39:30.588389 systemd[1]: Finished modprobe@loop.service. Feb 9 19:39:30.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.590991 systemd[1]: Finished systemd-modules-load.service. Feb 9 19:39:30.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.593546 systemd[1]: Finished systemd-network-generator.service. Feb 9 19:39:30.595000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.596233 systemd[1]: Finished systemd-remount-fs.service. Feb 9 19:39:30.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.599160 systemd[1]: Reached target network-pre.target. Feb 9 19:39:30.603064 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 19:39:30.606892 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 19:39:30.612270 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 19:39:30.624149 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 19:39:30.627732 systemd[1]: Starting systemd-journal-flush.service... Feb 9 19:39:30.630041 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 19:39:30.631779 systemd[1]: Starting systemd-random-seed.service... Feb 9 19:39:30.634414 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 19:39:30.635969 systemd[1]: Starting systemd-sysctl.service... Feb 9 19:39:30.640190 systemd[1]: Starting systemd-sysusers.service... Feb 9 19:39:30.645464 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 19:39:30.648649 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 19:39:30.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.661973 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 19:39:30.666039 systemd[1]: Starting systemd-udev-settle.service... Feb 9 19:39:30.678495 systemd-journald[1127]: Time spent on flushing to /var/log/journal/22c91f17459d4851ad1a75402818e57d is 17.498ms for 1180 entries. Feb 9 19:39:30.678495 systemd-journald[1127]: System Journal (/var/log/journal/22c91f17459d4851ad1a75402818e57d) is 8.0M, max 2.6G, 2.6G free. Feb 9 19:39:30.820667 systemd-journald[1127]: Received client request to flush runtime journal. Feb 9 19:39:30.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:30.821036 udevadm[1157]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 19:39:30.688027 systemd[1]: Finished systemd-random-seed.service. Feb 9 19:39:30.690715 systemd[1]: Reached target first-boot-complete.target. Feb 9 19:39:30.718539 systemd[1]: Finished systemd-sysctl.service. Feb 9 19:39:30.821991 systemd[1]: Finished systemd-journal-flush.service. Feb 9 19:39:30.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:31.235908 systemd[1]: Finished systemd-sysusers.service. Feb 9 19:39:31.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:31.700141 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 19:39:31.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:31.703000 audit: BPF prog-id=18 op=LOAD Feb 9 19:39:31.703000 audit: BPF prog-id=19 op=LOAD Feb 9 19:39:31.703000 audit: BPF prog-id=7 op=UNLOAD Feb 9 19:39:31.703000 audit: BPF prog-id=8 op=UNLOAD Feb 9 19:39:31.704552 systemd[1]: Starting systemd-udevd.service... Feb 9 19:39:31.723313 systemd-udevd[1160]: Using default interface naming scheme 'v252'. Feb 9 19:39:31.922819 systemd[1]: Started systemd-udevd.service. Feb 9 19:39:31.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:31.926000 audit: BPF prog-id=20 op=LOAD Feb 9 19:39:31.927569 systemd[1]: Starting systemd-networkd.service... Feb 9 19:39:31.969552 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 9 19:39:31.991939 systemd[1]: Starting systemd-userdbd.service... Feb 9 19:39:31.990000 audit: BPF prog-id=21 op=LOAD Feb 9 19:39:31.990000 audit: BPF prog-id=22 op=LOAD Feb 9 19:39:31.990000 audit: BPF prog-id=23 op=LOAD Feb 9 19:39:32.039413 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 19:39:32.049014 systemd[1]: Started systemd-userdbd.service. Feb 9 19:39:32.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:32.044000 audit[1170]: AVC avc: denied { confidentiality } for pid=1170 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 19:39:32.061544 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 19:39:32.061614 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 19:39:32.070166 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 19:39:32.070239 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 19:39:32.077292 kernel: hv_vmbus: registering driver hv_utils Feb 9 19:39:32.080205 kernel: Console: switching to colour dummy device 80x25 Feb 9 19:39:32.085609 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 19:39:32.095409 kernel: hv_vmbus: registering driver hv_balloon Feb 9 19:39:32.108388 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 19:39:32.108495 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 19:39:32.108525 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 19:39:32.108547 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 19:39:32.044000 audit[1170]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55bef85c6150 a1=f884 a2=7f2c7ff5ebc5 a3=5 items=12 ppid=1160 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:32.044000 audit: CWD cwd="/" Feb 9 19:39:32.044000 audit: PATH item=0 name=(null) inode=237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=1 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=2 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=3 name=(null) inode=15581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=4 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=5 name=(null) inode=15582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=6 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=7 name=(null) inode=15583 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=8 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=9 name=(null) inode=15584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=10 name=(null) inode=15580 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PATH item=11 name=(null) inode=15585 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:39:32.044000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 19:39:32.294418 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1172) Feb 9 19:39:32.366190 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 19:39:32.437729 systemd-networkd[1166]: lo: Link UP Feb 9 19:39:32.438088 systemd-networkd[1166]: lo: Gained carrier Feb 9 19:39:32.438870 systemd-networkd[1166]: Enumeration completed Feb 9 19:39:32.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:32.440575 systemd[1]: Started systemd-networkd.service. Feb 9 19:39:32.445031 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:39:32.459081 systemd-networkd[1166]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:39:32.472386 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 9 19:39:32.500396 kernel: mlx5_core bf27:00:02.0 enP48935s1: Link up Feb 9 19:39:32.537395 kernel: hv_netvsc 000d3ab5-4ea1-000d-3ab5-4ea1000d3ab5 eth0: Data path switched to VF: enP48935s1 Feb 9 19:39:32.537469 systemd-networkd[1166]: enP48935s1: Link UP Feb 9 19:39:32.537607 systemd-networkd[1166]: eth0: Link UP Feb 9 19:39:32.537613 systemd-networkd[1166]: eth0: Gained carrier Feb 9 19:39:32.540661 systemd-networkd[1166]: enP48935s1: Gained carrier Feb 9 19:39:32.560740 systemd[1]: Finished systemd-udev-settle.service. Feb 9 19:39:32.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:32.564801 systemd[1]: Starting lvm2-activation-early.service... Feb 9 19:39:32.575498 systemd-networkd[1166]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:39:32.793102 lvm[1237]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:39:32.820359 systemd[1]: Finished lvm2-activation-early.service. Feb 9 19:39:32.822901 systemd[1]: Reached target cryptsetup.target. Feb 9 19:39:32.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:32.826440 systemd[1]: Starting lvm2-activation.service... Feb 9 19:39:32.832447 lvm[1238]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 19:39:32.855402 systemd[1]: Finished lvm2-activation.service. Feb 9 19:39:32.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:32.858187 systemd[1]: Reached target local-fs-pre.target. Feb 9 19:39:32.860503 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 19:39:32.860534 systemd[1]: Reached target local-fs.target. Feb 9 19:39:32.862828 systemd[1]: Reached target machines.target. Feb 9 19:39:32.866248 systemd[1]: Starting ldconfig.service... Feb 9 19:39:32.868310 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 19:39:32.868418 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:39:32.869597 systemd[1]: Starting systemd-boot-update.service... Feb 9 19:39:32.872867 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 19:39:32.876630 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 19:39:32.879200 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:39:32.879279 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 19:39:32.880473 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 19:39:32.947629 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1240 (bootctl) Feb 9 19:39:32.949008 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 19:39:33.351482 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 19:39:33.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:33.465554 systemd-tmpfiles[1243]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 19:39:33.489971 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 19:39:33.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:33.490824 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 19:39:33.530667 systemd-tmpfiles[1243]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 19:39:33.569787 systemd-tmpfiles[1243]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 19:39:33.932998 systemd-fsck[1248]: fsck.fat 4.2 (2021-01-31) Feb 9 19:39:33.932998 systemd-fsck[1248]: /dev/sda1: 789 files, 115339/258078 clusters Feb 9 19:39:33.935068 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 19:39:33.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:33.940109 systemd[1]: Mounting boot.mount... Feb 9 19:39:33.952927 systemd[1]: Mounted boot.mount. Feb 9 19:39:33.966610 systemd[1]: Finished systemd-boot-update.service. Feb 9 19:39:33.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:33.985508 systemd-networkd[1166]: eth0: Gained IPv6LL Feb 9 19:39:33.990157 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:39:33.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.106781 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 19:39:34.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.112879 systemd[1]: Starting audit-rules.service... Feb 9 19:39:34.116481 systemd[1]: Starting clean-ca-certificates.service... Feb 9 19:39:34.120272 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 19:39:34.124834 systemd[1]: Starting systemd-resolved.service... Feb 9 19:39:34.122000 audit: BPF prog-id=24 op=LOAD Feb 9 19:39:34.126000 audit: BPF prog-id=25 op=LOAD Feb 9 19:39:34.129381 systemd[1]: Starting systemd-timesyncd.service... Feb 9 19:39:34.133039 systemd[1]: Starting systemd-update-utmp.service... Feb 9 19:39:34.165463 systemd[1]: Finished clean-ca-certificates.service. Feb 9 19:39:34.168409 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 19:39:34.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.206000 audit[1260]: SYSTEM_BOOT pid=1260 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.213773 systemd[1]: Finished systemd-update-utmp.service. Feb 9 19:39:34.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.217564 systemd[1]: Started systemd-timesyncd.service. Feb 9 19:39:34.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.220311 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 19:39:34.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:39:34.223071 systemd[1]: Reached target time-set.target. Feb 9 19:39:34.291226 systemd-resolved[1257]: Positive Trust Anchors: Feb 9 19:39:34.291242 systemd-resolved[1257]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 19:39:34.291280 systemd-resolved[1257]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 19:39:34.404000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 19:39:34.404000 audit[1275]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffde0d98e10 a2=420 a3=0 items=0 ppid=1254 pid=1275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:39:34.404000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 19:39:34.406667 augenrules[1275]: No rules Feb 9 19:39:34.407140 systemd[1]: Finished audit-rules.service. Feb 9 19:39:34.423679 systemd-resolved[1257]: Using system hostname 'ci-3510.3.2-a-7a940f9dc1'. Feb 9 19:39:34.425319 systemd[1]: Started systemd-resolved.service. Feb 9 19:39:34.428443 systemd[1]: Reached target network.target. Feb 9 19:39:34.431153 systemd[1]: Reached target network-online.target. Feb 9 19:39:34.434308 systemd[1]: Reached target nss-lookup.target. Feb 9 19:39:34.502662 systemd-timesyncd[1259]: Contacted time server 77.68.25.145:123 (0.flatcar.pool.ntp.org). Feb 9 19:39:34.502749 systemd-timesyncd[1259]: Initial clock synchronization to Fri 2024-02-09 19:39:34.512277 UTC. Feb 9 19:39:38.425623 ldconfig[1239]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 19:39:38.438616 systemd[1]: Finished ldconfig.service. Feb 9 19:39:38.442249 systemd[1]: Starting systemd-update-done.service... Feb 9 19:39:38.450470 systemd[1]: Finished systemd-update-done.service. Feb 9 19:39:38.453635 systemd[1]: Reached target sysinit.target. Feb 9 19:39:38.456639 systemd[1]: Started motdgen.path. Feb 9 19:39:38.459420 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 19:39:38.462903 systemd[1]: Started logrotate.timer. Feb 9 19:39:38.465116 systemd[1]: Started mdadm.timer. Feb 9 19:39:38.467076 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 19:39:38.469430 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 19:39:38.469479 systemd[1]: Reached target paths.target. Feb 9 19:39:38.471545 systemd[1]: Reached target timers.target. Feb 9 19:39:38.473784 systemd[1]: Listening on dbus.socket. Feb 9 19:39:38.476645 systemd[1]: Starting docker.socket... Feb 9 19:39:38.481038 systemd[1]: Listening on sshd.socket. Feb 9 19:39:38.483199 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:39:38.483735 systemd[1]: Listening on docker.socket. Feb 9 19:39:38.485689 systemd[1]: Reached target sockets.target. Feb 9 19:39:38.487718 systemd[1]: Reached target basic.target. Feb 9 19:39:38.489608 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:39:38.489647 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 19:39:38.490775 systemd[1]: Starting containerd.service... Feb 9 19:39:38.493892 systemd[1]: Starting dbus.service... Feb 9 19:39:38.496827 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 19:39:38.500132 systemd[1]: Starting extend-filesystems.service... Feb 9 19:39:38.502102 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 19:39:38.503592 systemd[1]: Starting motdgen.service... Feb 9 19:39:38.507132 systemd[1]: Started nvidia.service. Feb 9 19:39:38.510649 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 19:39:38.514638 systemd[1]: Starting prepare-critools.service... Feb 9 19:39:38.517850 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 19:39:38.526786 systemd[1]: Starting sshd-keygen.service... Feb 9 19:39:38.532220 systemd[1]: Starting systemd-logind.service... Feb 9 19:39:38.537864 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 19:39:38.537962 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 19:39:38.538587 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 19:39:38.539616 systemd[1]: Starting update-engine.service... Feb 9 19:39:38.543041 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 19:39:38.550982 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 19:39:38.551240 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 19:39:38.603911 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 19:39:38.604108 systemd[1]: Finished motdgen.service. Feb 9 19:39:38.614690 extend-filesystems[1286]: Found sda Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda1 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda2 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda3 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found usr Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda4 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda6 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda7 Feb 9 19:39:38.616725 extend-filesystems[1286]: Found sda9 Feb 9 19:39:38.616725 extend-filesystems[1286]: Checking size of /dev/sda9 Feb 9 19:39:38.653933 jq[1303]: true Feb 9 19:39:38.672447 tar[1306]: crictl Feb 9 19:39:38.672698 tar[1305]: ./ Feb 9 19:39:38.672698 tar[1305]: ./loopback Feb 9 19:39:38.663307 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 19:39:38.672937 jq[1285]: false Feb 9 19:39:38.663539 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 19:39:38.677119 jq[1320]: true Feb 9 19:39:38.693829 systemd-logind[1299]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 19:39:38.694816 systemd-logind[1299]: New seat seat0. Feb 9 19:39:38.697213 extend-filesystems[1286]: Old size kept for /dev/sda9 Feb 9 19:39:38.703252 extend-filesystems[1286]: Found sr0 Feb 9 19:39:38.699170 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 19:39:38.699331 systemd[1]: Finished extend-filesystems.service. Feb 9 19:39:38.754483 dbus-daemon[1284]: [system] SELinux support is enabled Feb 9 19:39:38.754668 systemd[1]: Started dbus.service. Feb 9 19:39:38.759688 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 19:39:38.759718 systemd[1]: Reached target system-config.target. Feb 9 19:39:38.762163 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 19:39:38.762186 systemd[1]: Reached target user-config.target. Feb 9 19:39:38.767633 systemd[1]: Started systemd-logind.service. Feb 9 19:39:38.768220 dbus-daemon[1284]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 19:39:38.808652 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 19:39:38.811889 env[1310]: time="2024-02-09T19:39:38.811826377Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 19:39:38.828344 bash[1349]: Updated "/home/core/.ssh/authorized_keys" Feb 9 19:39:38.829145 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 19:39:38.851737 tar[1305]: ./bandwidth Feb 9 19:39:38.917935 env[1310]: time="2024-02-09T19:39:38.917883145Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 19:39:38.918071 env[1310]: time="2024-02-09T19:39:38.918055131Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.919911 env[1310]: time="2024-02-09T19:39:38.919867340Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:39:38.919911 env[1310]: time="2024-02-09T19:39:38.919909561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920209 env[1310]: time="2024-02-09T19:39:38.920180497Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920267 env[1310]: time="2024-02-09T19:39:38.920210912Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920267 env[1310]: time="2024-02-09T19:39:38.920228220Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 19:39:38.920267 env[1310]: time="2024-02-09T19:39:38.920242528Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920394 env[1310]: time="2024-02-09T19:39:38.920338376Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920665 env[1310]: time="2024-02-09T19:39:38.920640827Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920858 env[1310]: time="2024-02-09T19:39:38.920829622Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 19:39:38.920918 env[1310]: time="2024-02-09T19:39:38.920859637Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 19:39:38.920963 env[1310]: time="2024-02-09T19:39:38.920927371Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 19:39:38.920963 env[1310]: time="2024-02-09T19:39:38.920944880Z" level=info msg="metadata content store policy set" policy=shared Feb 9 19:39:38.953575 env[1310]: time="2024-02-09T19:39:38.953489395Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 19:39:38.953575 env[1310]: time="2024-02-09T19:39:38.953539320Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 19:39:38.953575 env[1310]: time="2024-02-09T19:39:38.953556528Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953616558Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953637569Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953702401Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953721811Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953743122Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953780 env[1310]: time="2024-02-09T19:39:38.953762131Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953979 env[1310]: time="2024-02-09T19:39:38.953780541Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953979 env[1310]: time="2024-02-09T19:39:38.953797849Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.953979 env[1310]: time="2024-02-09T19:39:38.953816959Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 19:39:38.953979 env[1310]: time="2024-02-09T19:39:38.953944223Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 19:39:38.954122 env[1310]: time="2024-02-09T19:39:38.954040371Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 19:39:38.954507 env[1310]: time="2024-02-09T19:39:38.954473188Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 19:39:38.954580 env[1310]: time="2024-02-09T19:39:38.954526515Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954580 env[1310]: time="2024-02-09T19:39:38.954549626Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 19:39:38.954669 env[1310]: time="2024-02-09T19:39:38.954621262Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954669 env[1310]: time="2024-02-09T19:39:38.954641172Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954739 env[1310]: time="2024-02-09T19:39:38.954659381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954784 env[1310]: time="2024-02-09T19:39:38.954736820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954784 env[1310]: time="2024-02-09T19:39:38.954756230Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954784 env[1310]: time="2024-02-09T19:39:38.954775039Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954884 env[1310]: time="2024-02-09T19:39:38.954791347Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954884 env[1310]: time="2024-02-09T19:39:38.954807756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.954884 env[1310]: time="2024-02-09T19:39:38.954826865Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 19:39:38.955006 env[1310]: time="2024-02-09T19:39:38.954978541Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.955006 env[1310]: time="2024-02-09T19:39:38.955000452Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.955076 env[1310]: time="2024-02-09T19:39:38.955018661Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.955076 env[1310]: time="2024-02-09T19:39:38.955036770Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 19:39:38.955076 env[1310]: time="2024-02-09T19:39:38.955058581Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 19:39:38.955179 env[1310]: time="2024-02-09T19:39:38.955074589Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 19:39:38.955179 env[1310]: time="2024-02-09T19:39:38.955099302Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 19:39:38.955179 env[1310]: time="2024-02-09T19:39:38.955140422Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 19:39:38.955500 env[1310]: time="2024-02-09T19:39:38.955427066Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.955513910Z" level=info msg="Connect containerd service" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.955559432Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.957291901Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958189251Z" level=info msg="Start subscribing containerd event" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958244278Z" level=info msg="Start recovering state" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958319416Z" level=info msg="Start event monitor" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958331922Z" level=info msg="Start snapshots syncer" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958344929Z" level=info msg="Start cni network conf syncer for default" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958356335Z" level=info msg="Start streaming server" Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958778346Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.958822968Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 19:39:38.981229 env[1310]: time="2024-02-09T19:39:38.959194655Z" level=info msg="containerd successfully booted in 0.149758s" Feb 9 19:39:38.958938 systemd[1]: Started containerd.service. Feb 9 19:39:38.993052 tar[1305]: ./ptp Feb 9 19:39:39.072055 tar[1305]: ./vlan Feb 9 19:39:39.156734 tar[1305]: ./host-device Feb 9 19:39:39.221869 update_engine[1302]: I0209 19:39:39.221516 1302 main.cc:92] Flatcar Update Engine starting Feb 9 19:39:39.248036 tar[1305]: ./tuning Feb 9 19:39:39.307573 systemd[1]: Started update-engine.service. Feb 9 19:39:39.310155 update_engine[1302]: I0209 19:39:39.308063 1302 update_check_scheduler.cc:74] Next update check in 8m4s Feb 9 19:39:39.312720 systemd[1]: Started locksmithd.service. Feb 9 19:39:39.320228 tar[1305]: ./vrf Feb 9 19:39:39.398757 tar[1305]: ./sbr Feb 9 19:39:39.479440 tar[1305]: ./tap Feb 9 19:39:39.573286 tar[1305]: ./dhcp Feb 9 19:39:39.669894 systemd[1]: Finished prepare-critools.service. Feb 9 19:39:39.694234 sshd_keygen[1301]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 19:39:39.701589 tar[1305]: ./static Feb 9 19:39:39.724545 systemd[1]: Finished sshd-keygen.service. Feb 9 19:39:39.728972 systemd[1]: Starting issuegen.service... Feb 9 19:39:39.732676 systemd[1]: Started waagent.service. Feb 9 19:39:39.738970 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 19:39:39.739152 systemd[1]: Finished issuegen.service. Feb 9 19:39:39.742852 systemd[1]: Starting systemd-user-sessions.service... Feb 9 19:39:39.749340 tar[1305]: ./firewall Feb 9 19:39:39.751471 systemd[1]: Finished systemd-user-sessions.service. Feb 9 19:39:39.756333 systemd[1]: Started getty@tty1.service. Feb 9 19:39:39.760262 systemd[1]: Started serial-getty@ttyS0.service. Feb 9 19:39:39.762730 systemd[1]: Reached target getty.target. Feb 9 19:39:39.798619 tar[1305]: ./macvlan Feb 9 19:39:39.836682 tar[1305]: ./dummy Feb 9 19:39:39.881583 tar[1305]: ./bridge Feb 9 19:39:39.922059 tar[1305]: ./ipvlan Feb 9 19:39:39.956656 tar[1305]: ./portmap Feb 9 19:39:39.988068 tar[1305]: ./host-local Feb 9 19:39:40.062240 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 19:39:40.065838 systemd[1]: Reached target multi-user.target. Feb 9 19:39:40.070881 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 19:39:40.084146 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 19:39:40.084344 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 19:39:40.092468 systemd[1]: Startup finished in 939ms (firmware) + 19.011s (loader) + 1.044s (kernel) + 14.167s (initrd) + 19.143s (userspace) = 54.306s. Feb 9 19:39:40.342835 login[1403]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 19:39:40.343356 login[1402]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:39:40.373317 systemd[1]: Created slice user-500.slice. Feb 9 19:39:40.374865 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 19:39:40.378325 systemd-logind[1299]: New session 2 of user core. Feb 9 19:39:40.425725 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 19:39:40.427515 systemd[1]: Starting user@500.service... Feb 9 19:39:40.447026 (systemd)[1412]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:39:40.553604 systemd[1412]: Queued start job for default target default.target. Feb 9 19:39:40.554214 systemd[1412]: Reached target paths.target. Feb 9 19:39:40.554243 systemd[1412]: Reached target sockets.target. Feb 9 19:39:40.554260 systemd[1412]: Reached target timers.target. Feb 9 19:39:40.554274 systemd[1412]: Reached target basic.target. Feb 9 19:39:40.554413 systemd[1]: Started user@500.service. Feb 9 19:39:40.555620 systemd[1]: Started session-2.scope. Feb 9 19:39:40.556239 systemd[1412]: Reached target default.target. Feb 9 19:39:40.556445 systemd[1412]: Startup finished in 102ms. Feb 9 19:39:40.636966 locksmithd[1387]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 19:39:41.345000 login[1403]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 19:39:41.350899 systemd[1]: Started session-1.scope. Feb 9 19:39:41.351527 systemd-logind[1299]: New session 1 of user core. Feb 9 19:39:45.085739 waagent[1397]: 2024-02-09T19:39:45.085628Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 19:39:45.098254 waagent[1397]: 2024-02-09T19:39:45.087132Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 19:39:45.098254 waagent[1397]: 2024-02-09T19:39:45.088017Z INFO Daemon Daemon Python: 3.9.16 Feb 9 19:39:45.098254 waagent[1397]: 2024-02-09T19:39:45.089137Z INFO Daemon Daemon Run daemon Feb 9 19:39:45.098254 waagent[1397]: 2024-02-09T19:39:45.090412Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 19:39:45.102229 waagent[1397]: 2024-02-09T19:39:45.102098Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:39:45.110086 waagent[1397]: 2024-02-09T19:39:45.109963Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:39:45.114878 waagent[1397]: 2024-02-09T19:39:45.114803Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:39:45.117509 waagent[1397]: 2024-02-09T19:39:45.117438Z INFO Daemon Daemon Using waagent for provisioning Feb 9 19:39:45.120675 waagent[1397]: 2024-02-09T19:39:45.120613Z INFO Daemon Daemon Activate resource disk Feb 9 19:39:45.123056 waagent[1397]: 2024-02-09T19:39:45.122985Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 19:39:45.129867 waagent[1397]: 2024-02-09T19:39:45.129797Z INFO Daemon Daemon Found device: None Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.130130Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.131287Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.133058Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.134018Z INFO Daemon Daemon Running default provisioning handler Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.143501Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.146164Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.147355Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 19:39:45.158127 waagent[1397]: 2024-02-09T19:39:45.148077Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 19:39:45.167004 waagent[1397]: 2024-02-09T19:39:45.166827Z INFO Daemon Daemon Successfully mounted dvd Feb 9 19:39:45.270971 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 19:39:45.291610 waagent[1397]: 2024-02-09T19:39:45.291452Z INFO Daemon Daemon Detect protocol endpoint Feb 9 19:39:45.296190 waagent[1397]: 2024-02-09T19:39:45.296068Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 19:39:45.300201 waagent[1397]: 2024-02-09T19:39:45.300110Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 19:39:45.304534 waagent[1397]: 2024-02-09T19:39:45.304458Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 19:39:45.308358 waagent[1397]: 2024-02-09T19:39:45.308269Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 19:39:45.311609 waagent[1397]: 2024-02-09T19:39:45.311532Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 19:39:45.430634 waagent[1397]: 2024-02-09T19:39:45.430491Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 19:39:45.438264 waagent[1397]: 2024-02-09T19:39:45.438205Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 19:39:45.441321 waagent[1397]: 2024-02-09T19:39:45.441243Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 19:39:46.013169 waagent[1397]: 2024-02-09T19:39:46.013023Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 19:39:46.022459 waagent[1397]: 2024-02-09T19:39:46.022381Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 19:39:46.027580 waagent[1397]: 2024-02-09T19:39:46.022828Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 19:39:46.123842 waagent[1397]: 2024-02-09T19:39:46.123716Z INFO Daemon Daemon Found private key matching thumbprint D6A79B4487190FF711D8DE736EF05DD5D8C05CE7 Feb 9 19:39:46.128461 waagent[1397]: 2024-02-09T19:39:46.128366Z INFO Daemon Daemon Certificate with thumbprint 05678EC4124DD35F4C10C0876A8498F22AF897FD has no matching private key. Feb 9 19:39:46.133139 waagent[1397]: 2024-02-09T19:39:46.133070Z INFO Daemon Daemon Fetch goal state completed Feb 9 19:39:46.157920 waagent[1397]: 2024-02-09T19:39:46.157853Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: a2e8e60a-0f5f-45ae-9780-7890b04f92d9 New eTag: 3915282344607977357] Feb 9 19:39:46.158931 waagent[1397]: 2024-02-09T19:39:46.158870Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:39:46.173039 waagent[1397]: 2024-02-09T19:39:46.172970Z INFO Daemon Daemon Starting provisioning Feb 9 19:39:46.183469 waagent[1397]: 2024-02-09T19:39:46.173274Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 19:39:46.183469 waagent[1397]: 2024-02-09T19:39:46.178183Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-7a940f9dc1] Feb 9 19:39:46.198583 waagent[1397]: 2024-02-09T19:39:46.198460Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-7a940f9dc1] Feb 9 19:39:46.206926 waagent[1397]: 2024-02-09T19:39:46.199167Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 19:39:46.206926 waagent[1397]: 2024-02-09T19:39:46.200121Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 19:39:46.215661 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 19:39:46.215930 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 19:39:46.216006 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 19:39:46.216349 systemd[1]: Stopping systemd-networkd.service... Feb 9 19:39:46.221427 systemd-networkd[1166]: eth0: DHCPv6 lease lost Feb 9 19:39:46.222921 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 19:39:46.223120 systemd[1]: Stopped systemd-networkd.service. Feb 9 19:39:46.225405 systemd[1]: Starting systemd-networkd.service... Feb 9 19:39:46.256938 systemd-networkd[1457]: enP48935s1: Link UP Feb 9 19:39:46.256948 systemd-networkd[1457]: enP48935s1: Gained carrier Feb 9 19:39:46.258268 systemd-networkd[1457]: eth0: Link UP Feb 9 19:39:46.258278 systemd-networkd[1457]: eth0: Gained carrier Feb 9 19:39:46.258716 systemd-networkd[1457]: lo: Link UP Feb 9 19:39:46.258726 systemd-networkd[1457]: lo: Gained carrier Feb 9 19:39:46.259034 systemd-networkd[1457]: eth0: Gained IPv6LL Feb 9 19:39:46.259310 systemd-networkd[1457]: Enumeration completed Feb 9 19:39:46.259442 systemd[1]: Started systemd-networkd.service. Feb 9 19:39:46.261764 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 19:39:46.264534 waagent[1397]: 2024-02-09T19:39:46.261346Z INFO Daemon Daemon Create user account if not exists Feb 9 19:39:46.265267 waagent[1397]: 2024-02-09T19:39:46.265174Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 19:39:46.268904 waagent[1397]: 2024-02-09T19:39:46.268813Z INFO Daemon Daemon Configure sudoer Feb 9 19:39:46.271456 systemd-networkd[1457]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 19:39:46.271856 waagent[1397]: 2024-02-09T19:39:46.271782Z INFO Daemon Daemon Configure sshd Feb 9 19:39:46.274236 waagent[1397]: 2024-02-09T19:39:46.274168Z INFO Daemon Daemon Deploy ssh public key. Feb 9 19:39:46.298157 waagent[1397]: 2024-02-09T19:39:46.298031Z INFO Daemon Daemon Decode custom data Feb 9 19:39:46.302557 waagent[1397]: 2024-02-09T19:39:46.298599Z INFO Daemon Daemon Save custom data Feb 9 19:39:46.336475 systemd-networkd[1457]: eth0: DHCPv4 address 10.200.8.15/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 9 19:39:46.339664 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 19:40:16.558928 waagent[1397]: 2024-02-09T19:40:16.558807Z INFO Daemon Daemon Provisioning complete Feb 9 19:40:16.571714 waagent[1397]: 2024-02-09T19:40:16.571642Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 19:40:16.578559 waagent[1397]: 2024-02-09T19:40:16.572064Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 19:40:16.578559 waagent[1397]: 2024-02-09T19:40:16.573867Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 19:40:16.841911 waagent[1466]: 2024-02-09T19:40:16.841733Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 19:40:16.842655 waagent[1466]: 2024-02-09T19:40:16.842586Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:16.842800 waagent[1466]: 2024-02-09T19:40:16.842744Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:16.854175 waagent[1466]: 2024-02-09T19:40:16.854080Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 19:40:16.854358 waagent[1466]: 2024-02-09T19:40:16.854298Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 19:40:16.917075 waagent[1466]: 2024-02-09T19:40:16.916939Z INFO ExtHandler ExtHandler Found private key matching thumbprint D6A79B4487190FF711D8DE736EF05DD5D8C05CE7 Feb 9 19:40:16.917313 waagent[1466]: 2024-02-09T19:40:16.917249Z INFO ExtHandler ExtHandler Certificate with thumbprint 05678EC4124DD35F4C10C0876A8498F22AF897FD has no matching private key. Feb 9 19:40:16.917578 waagent[1466]: 2024-02-09T19:40:16.917526Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 19:40:16.940094 waagent[1466]: 2024-02-09T19:40:16.940015Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: ff6ba4d0-ae4b-408d-8341-4c7aa3458c55 New eTag: 3915282344607977357] Feb 9 19:40:16.940770 waagent[1466]: 2024-02-09T19:40:16.940707Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 19:40:17.010848 waagent[1466]: 2024-02-09T19:40:17.010702Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:40:17.035407 waagent[1466]: 2024-02-09T19:40:17.035296Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1466 Feb 9 19:40:17.038886 waagent[1466]: 2024-02-09T19:40:17.038810Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:40:17.040157 waagent[1466]: 2024-02-09T19:40:17.040092Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:40:17.102296 waagent[1466]: 2024-02-09T19:40:17.102146Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:40:17.102903 waagent[1466]: 2024-02-09T19:40:17.102810Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:40:17.112540 waagent[1466]: 2024-02-09T19:40:17.112475Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:40:17.113037 waagent[1466]: 2024-02-09T19:40:17.112976Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:40:17.114181 waagent[1466]: 2024-02-09T19:40:17.114115Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 19:40:17.115489 waagent[1466]: 2024-02-09T19:40:17.115428Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:40:17.116117 waagent[1466]: 2024-02-09T19:40:17.116059Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:40:17.116705 waagent[1466]: 2024-02-09T19:40:17.116651Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:17.116840 waagent[1466]: 2024-02-09T19:40:17.116781Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:40:17.117067 waagent[1466]: 2024-02-09T19:40:17.117017Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:17.117290 waagent[1466]: 2024-02-09T19:40:17.117240Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:40:17.117512 waagent[1466]: 2024-02-09T19:40:17.117464Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:17.117985 waagent[1466]: 2024-02-09T19:40:17.117929Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:40:17.118540 waagent[1466]: 2024-02-09T19:40:17.118481Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:40:17.118707 waagent[1466]: 2024-02-09T19:40:17.118639Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:40:17.118869 waagent[1466]: 2024-02-09T19:40:17.118798Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:17.119126 waagent[1466]: 2024-02-09T19:40:17.119076Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:40:17.119213 waagent[1466]: 2024-02-09T19:40:17.119158Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:40:17.120097 waagent[1466]: 2024-02-09T19:40:17.120042Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:40:17.120852 waagent[1466]: 2024-02-09T19:40:17.120795Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:40:17.120852 waagent[1466]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:40:17.120852 waagent[1466]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:40:17.120852 waagent[1466]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:40:17.120852 waagent[1466]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:17.120852 waagent[1466]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:17.120852 waagent[1466]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:17.124761 waagent[1466]: 2024-02-09T19:40:17.124695Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:40:17.136952 waagent[1466]: 2024-02-09T19:40:17.136895Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 19:40:17.138625 waagent[1466]: 2024-02-09T19:40:17.138573Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:40:17.139794 waagent[1466]: 2024-02-09T19:40:17.139743Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 19:40:17.185091 waagent[1466]: 2024-02-09T19:40:17.185016Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 19:40:17.193448 waagent[1466]: 2024-02-09T19:40:17.193381Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1457' Feb 9 19:40:17.261995 waagent[1466]: 2024-02-09T19:40:17.260674Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:40:17.261995 waagent[1466]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:40:17.261995 waagent[1466]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:40:17.261995 waagent[1466]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:4e:a1 brd ff:ff:ff:ff:ff:ff Feb 9 19:40:17.261995 waagent[1466]: 3: enP48935s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:4e:a1 brd ff:ff:ff:ff:ff:ff\ altname enP48935p0s2 Feb 9 19:40:17.261995 waagent[1466]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:40:17.261995 waagent[1466]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:40:17.261995 waagent[1466]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:40:17.261995 waagent[1466]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:40:17.261995 waagent[1466]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:40:17.261995 waagent[1466]: 2: eth0 inet6 fe80::20d:3aff:feb5:4ea1/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:40:17.439718 waagent[1466]: 2024-02-09T19:40:17.439622Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 19:40:17.445184 waagent[1466]: 2024-02-09T19:40:17.445111Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 19:40:17.445184 waagent[1466]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:17.445184 waagent[1466]: pkts bytes target prot opt in out source destination Feb 9 19:40:17.445184 waagent[1466]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:17.445184 waagent[1466]: pkts bytes target prot opt in out source destination Feb 9 19:40:17.445184 waagent[1466]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:17.445184 waagent[1466]: pkts bytes target prot opt in out source destination Feb 9 19:40:17.445184 waagent[1466]: 21 1092 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:40:17.445184 waagent[1466]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:40:17.447129 waagent[1466]: 2024-02-09T19:40:17.447074Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 19:40:17.457798 waagent[1466]: 2024-02-09T19:40:17.457732Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 19:40:17.577833 waagent[1397]: 2024-02-09T19:40:17.577669Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 19:40:17.583433 waagent[1397]: 2024-02-09T19:40:17.583336Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 19:40:18.597172 waagent[1506]: 2024-02-09T19:40:18.597054Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 19:40:18.597886 waagent[1506]: 2024-02-09T19:40:18.597819Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 19:40:18.598043 waagent[1506]: 2024-02-09T19:40:18.597978Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 19:40:18.607315 waagent[1506]: 2024-02-09T19:40:18.607211Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 19:40:18.607718 waagent[1506]: 2024-02-09T19:40:18.607661Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:18.607879 waagent[1506]: 2024-02-09T19:40:18.607829Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:18.619335 waagent[1506]: 2024-02-09T19:40:18.619256Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 19:40:18.627906 waagent[1506]: 2024-02-09T19:40:18.627839Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 19:40:18.628885 waagent[1506]: 2024-02-09T19:40:18.628823Z INFO ExtHandler Feb 9 19:40:18.629034 waagent[1506]: 2024-02-09T19:40:18.628981Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 6f099598-5362-4455-b0c9-6a0e660779c9 eTag: 3915282344607977357 source: Fabric] Feb 9 19:40:18.629741 waagent[1506]: 2024-02-09T19:40:18.629683Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 19:40:18.630831 waagent[1506]: 2024-02-09T19:40:18.630770Z INFO ExtHandler Feb 9 19:40:18.630961 waagent[1506]: 2024-02-09T19:40:18.630910Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 19:40:18.638249 waagent[1506]: 2024-02-09T19:40:18.638190Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 19:40:18.638728 waagent[1506]: 2024-02-09T19:40:18.638679Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 19:40:18.659228 waagent[1506]: 2024-02-09T19:40:18.659163Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 19:40:18.736132 waagent[1506]: 2024-02-09T19:40:18.735987Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D6A79B4487190FF711D8DE736EF05DD5D8C05CE7', 'hasPrivateKey': True} Feb 9 19:40:18.737140 waagent[1506]: 2024-02-09T19:40:18.737070Z INFO ExtHandler Downloaded certificate {'thumbprint': '05678EC4124DD35F4C10C0876A8498F22AF897FD', 'hasPrivateKey': False} Feb 9 19:40:18.738130 waagent[1506]: 2024-02-09T19:40:18.738067Z INFO ExtHandler Fetch goal state completed Feb 9 19:40:18.758232 waagent[1506]: 2024-02-09T19:40:18.758152Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1506 Feb 9 19:40:18.761510 waagent[1506]: 2024-02-09T19:40:18.761440Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 19:40:18.762968 waagent[1506]: 2024-02-09T19:40:18.762910Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 19:40:18.767983 waagent[1506]: 2024-02-09T19:40:18.767927Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 19:40:18.768345 waagent[1506]: 2024-02-09T19:40:18.768289Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 19:40:18.776270 waagent[1506]: 2024-02-09T19:40:18.776213Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 19:40:18.776754 waagent[1506]: 2024-02-09T19:40:18.776696Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 19:40:18.796720 waagent[1506]: 2024-02-09T19:40:18.796588Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 19:40:18.799838 waagent[1506]: 2024-02-09T19:40:18.799726Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 19:40:18.804607 waagent[1506]: 2024-02-09T19:40:18.804542Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 19:40:18.806047 waagent[1506]: 2024-02-09T19:40:18.805986Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 19:40:18.806287 waagent[1506]: 2024-02-09T19:40:18.806230Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:18.806781 waagent[1506]: 2024-02-09T19:40:18.806726Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:18.807304 waagent[1506]: 2024-02-09T19:40:18.807245Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 19:40:18.807607 waagent[1506]: 2024-02-09T19:40:18.807550Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 19:40:18.807607 waagent[1506]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 19:40:18.807607 waagent[1506]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 19:40:18.807607 waagent[1506]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 19:40:18.807607 waagent[1506]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:18.807607 waagent[1506]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:18.807607 waagent[1506]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 19:40:18.810395 waagent[1506]: 2024-02-09T19:40:18.810251Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 19:40:18.811186 waagent[1506]: 2024-02-09T19:40:18.811125Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 19:40:18.811523 waagent[1506]: 2024-02-09T19:40:18.811462Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 19:40:18.811938 waagent[1506]: 2024-02-09T19:40:18.811885Z INFO EnvHandler ExtHandler Configure routes Feb 9 19:40:18.812091 waagent[1506]: 2024-02-09T19:40:18.812043Z INFO EnvHandler ExtHandler Gateway:None Feb 9 19:40:18.812384 waagent[1506]: 2024-02-09T19:40:18.812311Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 19:40:18.812533 waagent[1506]: 2024-02-09T19:40:18.812481Z INFO EnvHandler ExtHandler Routes:None Feb 9 19:40:18.812796 waagent[1506]: 2024-02-09T19:40:18.812742Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 19:40:18.817121 waagent[1506]: 2024-02-09T19:40:18.817042Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 19:40:18.817476 waagent[1506]: 2024-02-09T19:40:18.817420Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 19:40:18.818126 waagent[1506]: 2024-02-09T19:40:18.818075Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 19:40:18.842299 waagent[1506]: 2024-02-09T19:40:18.842223Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 19:40:18.846247 waagent[1506]: 2024-02-09T19:40:18.846181Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 19:40:18.847867 waagent[1506]: 2024-02-09T19:40:18.847756Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 19:40:18.847867 waagent[1506]: Executing ['ip', '-a', '-o', 'link']: Feb 9 19:40:18.847867 waagent[1506]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 19:40:18.847867 waagent[1506]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:4e:a1 brd ff:ff:ff:ff:ff:ff Feb 9 19:40:18.847867 waagent[1506]: 3: enP48935s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:4e:a1 brd ff:ff:ff:ff:ff:ff\ altname enP48935p0s2 Feb 9 19:40:18.847867 waagent[1506]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 19:40:18.847867 waagent[1506]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 19:40:18.847867 waagent[1506]: 2: eth0 inet 10.200.8.15/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 19:40:18.847867 waagent[1506]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 19:40:18.847867 waagent[1506]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 19:40:18.847867 waagent[1506]: 2: eth0 inet6 fe80::20d:3aff:feb5:4ea1/64 scope link \ valid_lft forever preferred_lft forever Feb 9 19:40:18.904798 waagent[1506]: 2024-02-09T19:40:18.904713Z INFO ExtHandler ExtHandler Feb 9 19:40:18.904965 waagent[1506]: 2024-02-09T19:40:18.904908Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 1d5bfa82-819f-45f4-affb-129288241ea0 correlation eee35032-608e-4fe9-8b9a-5c7d2fda2ff0 created: 2024-02-09T19:38:34.950424Z] Feb 9 19:40:18.906091 waagent[1506]: 2024-02-09T19:40:18.906024Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 19:40:18.907978 waagent[1506]: 2024-02-09T19:40:18.907920Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 19:40:18.931883 waagent[1506]: 2024-02-09T19:40:18.931809Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 19:40:18.951472 waagent[1506]: 2024-02-09T19:40:18.951312Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 9435E923-F694-4BAA-91E3-FB3DE766A746;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 19:40:18.966936 waagent[1506]: 2024-02-09T19:40:18.966830Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 19:40:18.966936 waagent[1506]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:18.966936 waagent[1506]: pkts bytes target prot opt in out source destination Feb 9 19:40:18.966936 waagent[1506]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:18.966936 waagent[1506]: pkts bytes target prot opt in out source destination Feb 9 19:40:18.966936 waagent[1506]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 19:40:18.966936 waagent[1506]: pkts bytes target prot opt in out source destination Feb 9 19:40:18.966936 waagent[1506]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 19:40:18.966936 waagent[1506]: 13 1465 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 19:40:18.966936 waagent[1506]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 19:40:20.296103 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 9 19:40:24.776418 update_engine[1302]: I0209 19:40:24.776331 1302 update_attempter.cc:509] Updating boot flags... Feb 9 19:40:42.688790 systemd[1]: Created slice system-sshd.slice. Feb 9 19:40:42.690791 systemd[1]: Started sshd@0-10.200.8.15:22-10.200.12.6:42308.service. Feb 9 19:40:43.471153 sshd[1614]: Accepted publickey for core from 10.200.12.6 port 42308 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:43.472817 sshd[1614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:43.477838 systemd-logind[1299]: New session 3 of user core. Feb 9 19:40:43.478805 systemd[1]: Started session-3.scope. Feb 9 19:40:44.005925 systemd[1]: Started sshd@1-10.200.8.15:22-10.200.12.6:42314.service. Feb 9 19:40:44.627252 sshd[1619]: Accepted publickey for core from 10.200.12.6 port 42314 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:44.628874 sshd[1619]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:44.633561 systemd[1]: Started session-4.scope. Feb 9 19:40:44.634000 systemd-logind[1299]: New session 4 of user core. Feb 9 19:40:45.066832 sshd[1619]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:45.070499 systemd[1]: sshd@1-10.200.8.15:22-10.200.12.6:42314.service: Deactivated successfully. Feb 9 19:40:45.071448 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:40:45.072074 systemd-logind[1299]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:40:45.072814 systemd-logind[1299]: Removed session 4. Feb 9 19:40:45.172701 systemd[1]: Started sshd@2-10.200.8.15:22-10.200.12.6:42328.service. Feb 9 19:40:45.796795 sshd[1625]: Accepted publickey for core from 10.200.12.6 port 42328 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:45.798152 sshd[1625]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:45.803634 systemd[1]: Started session-5.scope. Feb 9 19:40:45.804186 systemd-logind[1299]: New session 5 of user core. Feb 9 19:40:46.234566 sshd[1625]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:46.237677 systemd[1]: sshd@2-10.200.8.15:22-10.200.12.6:42328.service: Deactivated successfully. Feb 9 19:40:46.238753 systemd-logind[1299]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:40:46.238833 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:40:46.239885 systemd-logind[1299]: Removed session 5. Feb 9 19:40:46.339986 systemd[1]: Started sshd@3-10.200.8.15:22-10.200.12.6:42338.service. Feb 9 19:40:46.984612 sshd[1631]: Accepted publickey for core from 10.200.12.6 port 42338 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:46.986221 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:46.991896 systemd[1]: Started session-6.scope. Feb 9 19:40:46.992467 systemd-logind[1299]: New session 6 of user core. Feb 9 19:40:47.427506 sshd[1631]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:47.430296 systemd[1]: sshd@3-10.200.8.15:22-10.200.12.6:42338.service: Deactivated successfully. Feb 9 19:40:47.431443 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:40:47.432220 systemd-logind[1299]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:40:47.433130 systemd-logind[1299]: Removed session 6. Feb 9 19:40:47.530734 systemd[1]: Started sshd@4-10.200.8.15:22-10.200.12.6:55082.service. Feb 9 19:40:48.147648 sshd[1637]: Accepted publickey for core from 10.200.12.6 port 55082 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:48.149030 sshd[1637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:48.153666 systemd[1]: Started session-7.scope. Feb 9 19:40:48.154095 systemd-logind[1299]: New session 7 of user core. Feb 9 19:40:48.684005 sudo[1640]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:40:48.684348 sudo[1640]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:40:48.703559 dbus-daemon[1284]: \xd0-:\xd7\xd4U: received setenforce notice (enforcing=-830323056) Feb 9 19:40:48.705389 sudo[1640]: pam_unix(sudo:session): session closed for user root Feb 9 19:40:48.840873 sshd[1637]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:48.844060 systemd[1]: sshd@4-10.200.8.15:22-10.200.12.6:55082.service: Deactivated successfully. Feb 9 19:40:48.844985 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:40:48.845626 systemd-logind[1299]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:40:48.846451 systemd-logind[1299]: Removed session 7. Feb 9 19:40:48.942786 systemd[1]: Started sshd@5-10.200.8.15:22-10.200.12.6:55098.service. Feb 9 19:40:49.561860 sshd[1644]: Accepted publickey for core from 10.200.12.6 port 55098 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:49.563518 sshd[1644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:49.569028 systemd[1]: Started session-8.scope. Feb 9 19:40:49.569599 systemd-logind[1299]: New session 8 of user core. Feb 9 19:40:49.910266 sudo[1648]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:40:49.910563 sudo[1648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:40:49.913733 sudo[1648]: pam_unix(sudo:session): session closed for user root Feb 9 19:40:49.919354 sudo[1647]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:40:49.919638 sudo[1647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:40:49.929071 systemd[1]: Stopping audit-rules.service... Feb 9 19:40:49.929000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:40:49.933679 auditctl[1651]: No rules Feb 9 19:40:49.934839 kernel: kauditd_printk_skb: 85 callbacks suppressed Feb 9 19:40:49.934939 kernel: audit: type=1305 audit(1707507649.929:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:40:49.935408 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:40:49.935620 systemd[1]: Stopped audit-rules.service. Feb 9 19:40:49.937696 systemd[1]: Starting audit-rules.service... Feb 9 19:40:49.929000 audit[1651]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb6dd7410 a2=420 a3=0 items=0 ppid=1 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:49.956091 kernel: audit: type=1300 audit(1707507649.929:165): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcb6dd7410 a2=420 a3=0 items=0 ppid=1 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:49.956196 kernel: audit: type=1327 audit(1707507649.929:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:40:49.929000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:40:49.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.960849 augenrules[1668]: No rules Feb 9 19:40:49.961635 systemd[1]: Finished audit-rules.service. Feb 9 19:40:49.963896 sudo[1647]: pam_unix(sudo:session): session closed for user root Feb 9 19:40:49.970426 kernel: audit: type=1131 audit(1707507649.934:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.970495 kernel: audit: type=1130 audit(1707507649.959:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.959000 audit[1647]: USER_END pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.993462 kernel: audit: type=1106 audit(1707507649.959:168): pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:50.002120 kernel: audit: type=1104 audit(1707507649.959:169): pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:49.959000 audit[1647]: CRED_DISP pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:50.062009 sshd[1644]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:50.061000 audit[1644]: USER_END pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.065469 systemd-logind[1299]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:40:50.066737 systemd[1]: sshd@5-10.200.8.15:22-10.200.12.6:55098.service: Deactivated successfully. Feb 9 19:40:50.067508 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:40:50.068536 systemd-logind[1299]: Removed session 8. Feb 9 19:40:50.062000 audit[1644]: CRED_DISP pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.098952 kernel: audit: type=1106 audit(1707507650.061:170): pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.099101 kernel: audit: type=1104 audit(1707507650.062:171): pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.099126 kernel: audit: type=1131 audit(1707507650.065:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:55098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:50.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.15:22-10.200.12.6:55098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:50.186244 systemd[1]: Started sshd@6-10.200.8.15:22-10.200.12.6:55110.service. Feb 9 19:40:50.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:55110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:50.821000 audit[1674]: USER_ACCT pid=1674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.823164 sshd[1674]: Accepted publickey for core from 10.200.12.6 port 55110 ssh2: RSA SHA256:DU+Yi2nD7nw8jYgdAj8DCdA8ysRsrSuDu1TpdDncLY8 Feb 9 19:40:50.822000 audit[1674]: CRED_ACQ pid=1674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.823000 audit[1674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe73886b50 a2=3 a3=0 items=0 ppid=1 pid=1674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:50.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:40:50.824806 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:40:50.829955 systemd[1]: Started session-9.scope. Feb 9 19:40:50.830566 systemd-logind[1299]: New session 9 of user core. Feb 9 19:40:50.833000 audit[1674]: USER_START pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:50.834000 audit[1676]: CRED_ACQ pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:51.165000 audit[1677]: USER_ACCT pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:51.165000 audit[1677]: CRED_REFR pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:51.166744 sudo[1677]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:40:51.167012 sudo[1677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:40:51.167000 audit[1677]: USER_START pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:51.801602 systemd[1]: Reloading. Feb 9 19:40:51.887992 /usr/lib/systemd/system-generators/torcx-generator[1707]: time="2024-02-09T19:40:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:40:51.888033 /usr/lib/systemd/system-generators/torcx-generator[1707]: time="2024-02-09T19:40:51Z" level=info msg="torcx already run" Feb 9 19:40:51.972357 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:40:51.972389 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:40:51.988708 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.055000 audit: BPF prog-id=32 op=LOAD Feb 9 19:40:52.055000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.058000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.059000 audit: BPF prog-id=33 op=LOAD Feb 9 19:40:52.059000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit: BPF prog-id=34 op=LOAD Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit: BPF prog-id=35 op=LOAD Feb 9 19:40:52.061000 audit: BPF prog-id=18 op=UNLOAD Feb 9 19:40:52.061000 audit: BPF prog-id=19 op=UNLOAD Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.061000 audit: BPF prog-id=36 op=LOAD Feb 9 19:40:52.061000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit: BPF prog-id=37 op=LOAD Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.062000 audit: BPF prog-id=38 op=LOAD Feb 9 19:40:52.062000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:40:52.062000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit: BPF prog-id=39 op=LOAD Feb 9 19:40:52.064000 audit: BPF prog-id=26 op=UNLOAD Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit: BPF prog-id=40 op=LOAD Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit: BPF prog-id=41 op=LOAD Feb 9 19:40:52.064000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:40:52.064000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.065000 audit: BPF prog-id=42 op=LOAD Feb 9 19:40:52.065000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit: BPF prog-id=43 op=LOAD Feb 9 19:40:52.067000 audit: BPF prog-id=15 op=UNLOAD Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit: BPF prog-id=44 op=LOAD Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.067000 audit: BPF prog-id=45 op=LOAD Feb 9 19:40:52.067000 audit: BPF prog-id=16 op=UNLOAD Feb 9 19:40:52.067000 audit: BPF prog-id=17 op=UNLOAD Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:52.068000 audit: BPF prog-id=46 op=LOAD Feb 9 19:40:52.068000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:40:52.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:52.081249 systemd[1]: Started kubelet.service. Feb 9 19:40:52.109212 systemd[1]: Starting coreos-metadata.service... Feb 9 19:40:52.169920 coreos-metadata[1776]: Feb 09 19:40:52.169 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:40:52.170343 kubelet[1768]: E0209 19:40:52.170024 1768 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 9 19:40:52.171953 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:40:52.172113 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:40:52.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:40:52.173478 coreos-metadata[1776]: Feb 09 19:40:52.173 INFO Fetch successful Feb 9 19:40:52.173478 coreos-metadata[1776]: Feb 09 19:40:52.173 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 19:40:52.175226 coreos-metadata[1776]: Feb 09 19:40:52.174 INFO Fetch successful Feb 9 19:40:52.175226 coreos-metadata[1776]: Feb 09 19:40:52.175 INFO Fetching http://168.63.129.16/machine/39d5642a-b574-4556-9c13-063a8b173222/52ec9619%2D32a8%2D44aa%2D9192%2Dbee18b65b9e0.%5Fci%2D3510.3.2%2Da%2D7a940f9dc1?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 19:40:52.176739 coreos-metadata[1776]: Feb 09 19:40:52.176 INFO Fetch successful Feb 9 19:40:52.209058 coreos-metadata[1776]: Feb 09 19:40:52.209 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:40:52.220016 coreos-metadata[1776]: Feb 09 19:40:52.219 INFO Fetch successful Feb 9 19:40:52.228906 systemd[1]: Finished coreos-metadata.service. Feb 9 19:40:52.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:54.728942 systemd[1]: Stopped kubelet.service. Feb 9 19:40:54.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:54.728000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:54.744054 systemd[1]: Reloading. Feb 9 19:40:54.809997 /usr/lib/systemd/system-generators/torcx-generator[1832]: time="2024-02-09T19:40:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:40:54.816477 /usr/lib/systemd/system-generators/torcx-generator[1832]: time="2024-02-09T19:40:54Z" level=info msg="torcx already run" Feb 9 19:40:54.912816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:40:54.912839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:40:54.929014 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:40:55.010235 kernel: kauditd_printk_skb: 188 callbacks suppressed Feb 9 19:40:55.010388 kernel: audit: type=1400 audit(1707507654.995:359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.035690 kernel: audit: type=1400 audit(1707507654.995:360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.035838 kernel: audit: type=1400 audit(1707507654.995:361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.047337 kernel: audit: type=1400 audit(1707507654.995:362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.064271 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:40:55.064416 kernel: audit: type=1400 audit(1707507654.995:363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.064443 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 19:40:55.064466 kernel: audit: backlog limit exceeded Feb 9 19:40:55.064490 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.072563 kernel: audit: type=1400 audit(1707507654.995:364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:54.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.009000 audit: BPF prog-id=47 op=LOAD Feb 9 19:40:55.010000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.024000 audit: BPF prog-id=48 op=LOAD Feb 9 19:40:55.024000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit: BPF prog-id=49 op=LOAD Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit: BPF prog-id=50 op=LOAD Feb 9 19:40:55.034000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:40:55.034000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.045000 audit: BPF prog-id=51 op=LOAD Feb 9 19:40:55.045000 audit: BPF prog-id=36 op=UNLOAD Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit: BPF prog-id=52 op=LOAD Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.088000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:40:55.088000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit: BPF prog-id=54 op=LOAD Feb 9 19:40:55.090000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit: BPF prog-id=55 op=LOAD Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit: BPF prog-id=56 op=LOAD Feb 9 19:40:55.091000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:40:55.091000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.091000 audit: BPF prog-id=57 op=LOAD Feb 9 19:40:55.091000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:40:55.093000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit: BPF prog-id=58 op=LOAD Feb 9 19:40:55.094000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:55.118986 systemd[1]: Started kubelet.service. Feb 9 19:40:55.164019 kubelet[1895]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:40:55.164019 kubelet[1895]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 19:40:55.164019 kubelet[1895]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:40:55.164531 kubelet[1895]: I0209 19:40:55.164074 1895 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:40:55.514462 kubelet[1895]: I0209 19:40:55.514426 1895 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 9 19:40:55.514462 kubelet[1895]: I0209 19:40:55.514454 1895 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:40:55.514750 kubelet[1895]: I0209 19:40:55.514729 1895 server.go:837] "Client rotation is on, will bootstrap in background" Feb 9 19:40:55.517078 kubelet[1895]: I0209 19:40:55.517048 1895 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:40:55.520132 kubelet[1895]: I0209 19:40:55.520107 1895 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:40:55.520353 kubelet[1895]: I0209 19:40:55.520338 1895 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:40:55.520460 kubelet[1895]: I0209 19:40:55.520444 1895 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:40:55.520588 kubelet[1895]: I0209 19:40:55.520471 1895 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:40:55.520588 kubelet[1895]: I0209 19:40:55.520486 1895 container_manager_linux.go:302] "Creating device plugin manager" Feb 9 19:40:55.520717 kubelet[1895]: I0209 19:40:55.520597 1895 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:40:55.523901 kubelet[1895]: I0209 19:40:55.523879 1895 kubelet.go:405] "Attempting to sync node with API server" Feb 9 19:40:55.523901 kubelet[1895]: I0209 19:40:55.523904 1895 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:40:55.524050 kubelet[1895]: I0209 19:40:55.523926 1895 kubelet.go:309] "Adding apiserver pod source" Feb 9 19:40:55.524050 kubelet[1895]: I0209 19:40:55.523943 1895 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:40:55.524596 kubelet[1895]: E0209 19:40:55.524575 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:55.524674 kubelet[1895]: E0209 19:40:55.524609 1895 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:55.524949 kubelet[1895]: I0209 19:40:55.524928 1895 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:40:55.525231 kubelet[1895]: W0209 19:40:55.525214 1895 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:40:55.525702 kubelet[1895]: I0209 19:40:55.525682 1895 server.go:1168] "Started kubelet" Feb 9 19:40:55.525893 kubelet[1895]: I0209 19:40:55.525878 1895 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:40:55.526903 kubelet[1895]: I0209 19:40:55.526886 1895 server.go:461] "Adding debug handlers to kubelet server" Feb 9 19:40:55.528480 kubelet[1895]: E0209 19:40:55.528461 1895 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:40:55.528551 kubelet[1895]: E0209 19:40:55.528507 1895 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:40:55.529768 kubelet[1895]: I0209 19:40:55.525918 1895 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 19:40:55.528000 audit[1895]: AVC avc: denied { mac_admin } for pid=1895 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.528000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:40:55.528000 audit[1895]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e26690 a1=c000bd8978 a2=c000e26660 a3=25 items=0 ppid=1 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.528000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:40:55.528000 audit[1895]: AVC avc: denied { mac_admin } for pid=1895 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.528000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:40:55.528000 audit[1895]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e065c0 a1=c000bd8990 a2=c000e26720 a3=25 items=0 ppid=1 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.528000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:40:55.530601 kubelet[1895]: I0209 19:40:55.530072 1895 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:40:55.530601 kubelet[1895]: I0209 19:40:55.530117 1895 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:40:55.530601 kubelet[1895]: I0209 19:40:55.530187 1895 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:40:55.533521 kubelet[1895]: I0209 19:40:55.533501 1895 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 9 19:40:55.534928 kubelet[1895]: I0209 19:40:55.534910 1895 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 9 19:40:55.538000 audit[1905]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.538000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2fbc4970 a2=0 a3=7ffe2fbc495c items=0 ppid=1895 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.538000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:40:55.545497 kubelet[1895]: W0209 19:40:55.545472 1895 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:40:55.545590 kubelet[1895]: E0209 19:40:55.545507 1895 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:40:55.545590 kubelet[1895]: W0209 19:40:55.545554 1895 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:40:55.545590 kubelet[1895]: E0209 19:40:55.545566 1895 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.15" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:40:55.545721 kubelet[1895]: W0209 19:40:55.545603 1895 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:40:55.545721 kubelet[1895]: E0209 19:40:55.545615 1895 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:40:55.545838 kubelet[1895]: E0209 19:40:55.545646 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7adde068", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 525654632, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 525654632, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.546022 kubelet[1895]: E0209 19:40:55.545892 1895 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 19:40:55.547856 kubelet[1895]: E0209 19:40:55.547775 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7b08f82e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 528478766, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 528478766, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.547000 audit[1907]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.547000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff120f1c50 a2=0 a3=7fff120f1c3c items=0 ppid=1895 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.547000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:40:55.560000 audit[1909]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.560000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcfe8bc130 a2=0 a3=7ffcfe8bc11c items=0 ppid=1895 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.560000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:40:55.562000 audit[1911]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.562000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe56e33910 a2=0 a3=7ffe56e338fc items=0 ppid=1895 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.562000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:40:55.569366 kubelet[1895]: E0209 19:40:55.569265 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf44a94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560678036, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560678036, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.569790 kubelet[1895]: I0209 19:40:55.569596 1895 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:40:55.569874 kubelet[1895]: I0209 19:40:55.569794 1895 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:40:55.569874 kubelet[1895]: I0209 19:40:55.569814 1895 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:40:55.570453 kubelet[1895]: E0209 19:40:55.570396 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf45c29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560682537, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560682537, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.571275 kubelet[1895]: E0209 19:40:55.571212 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf46845", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560685637, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560685637, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.574741 kubelet[1895]: I0209 19:40:55.574722 1895 policy_none.go:49] "None policy: Start" Feb 9 19:40:55.575402 kubelet[1895]: I0209 19:40:55.575360 1895 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:40:55.575473 kubelet[1895]: I0209 19:40:55.575405 1895 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:40:55.581987 systemd[1]: Created slice kubepods.slice. Feb 9 19:40:55.585974 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:40:55.589059 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:40:55.593000 audit[1917]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.593000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd014a4c50 a2=0 a3=7ffd014a4c3c items=0 ppid=1895 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.593000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:40:55.595741 kubelet[1895]: I0209 19:40:55.595720 1895 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:40:55.595000 audit[1919]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:40:55.595000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdf5fe4a00 a2=0 a3=7ffdf5fe49ec items=0 ppid=1895 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:40:55.597512 kubelet[1895]: I0209 19:40:55.597493 1895 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:40:55.596000 audit[1895]: AVC avc: denied { mac_admin } for pid=1895 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:55.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:40:55.596000 audit[1895]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d02d80 a1=c000d052f0 a2=c000d02d50 a3=25 items=0 ppid=1 pid=1895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.596000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:40:55.597823 kubelet[1895]: I0209 19:40:55.597569 1895 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:40:55.597823 kubelet[1895]: I0209 19:40:55.597799 1895 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:40:55.598612 kubelet[1895]: I0209 19:40:55.598598 1895 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:40:55.598727 kubelet[1895]: I0209 19:40:55.598716 1895 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 9 19:40:55.598814 kubelet[1895]: I0209 19:40:55.598805 1895 kubelet.go:2257] "Starting kubelet main sync loop" Feb 9 19:40:55.598941 kubelet[1895]: E0209 19:40:55.598929 1895 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:40:55.598000 audit[1920]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.598000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffceb43bad0 a2=0 a3=7ffceb43babc items=0 ppid=1895 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.598000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:40:55.601215 kubelet[1895]: E0209 19:40:55.601199 1895 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.15\" not found" Feb 9 19:40:55.602214 kubelet[1895]: W0209 19:40:55.602184 1895 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:40:55.602325 kubelet[1895]: E0209 19:40:55.602314 1895 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:40:55.602626 kubelet[1895]: E0209 19:40:55.602541 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7f641e8a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 601561226, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 601561226, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.602000 audit[1922]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.602000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeffd0f3d0 a2=0 a3=7ffeffd0f3bc items=0 ppid=1895 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.602000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:40:55.602000 audit[1921]: NETFILTER_CFG table=mangle:14 family=10 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:40:55.602000 audit[1921]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc156db7d0 a2=0 a3=7ffc156db7bc items=0 ppid=1895 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.602000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:40:55.604000 audit[1924]: NETFILTER_CFG table=nat:15 family=10 entries=2 op=nft_register_chain pid=1924 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:40:55.604000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe9d189fc0 a2=0 a3=7ffe9d189fac items=0 ppid=1895 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:40:55.604000 audit[1923]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:40:55.604000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4568f2a0 a2=0 a3=7ffc4568f28c items=0 ppid=1895 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:40:55.605000 audit[1925]: NETFILTER_CFG table=filter:17 family=10 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:40:55.605000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff9f98e2a0 a2=0 a3=7fff9f98e28c items=0 ppid=1895 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:55.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:40:55.634834 kubelet[1895]: I0209 19:40:55.634799 1895 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Feb 9 19:40:55.636230 kubelet[1895]: E0209 19:40:55.636202 1895 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Feb 9 19:40:55.636630 kubelet[1895]: E0209 19:40:55.636552 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf44a94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560678036, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 634725476, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf44a94" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.637559 kubelet[1895]: E0209 19:40:55.637475 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf45c29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560682537, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 634742878, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf45c29" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.638326 kubelet[1895]: E0209 19:40:55.638265 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf46845", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560685637, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 634747078, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf46845" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.747288 kubelet[1895]: E0209 19:40:55.747252 1895 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 19:40:55.842459 kubelet[1895]: I0209 19:40:55.837222 1895 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Feb 9 19:40:55.842459 kubelet[1895]: E0209 19:40:55.839113 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf44a94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560678036, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 837173763, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf44a94" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.842459 kubelet[1895]: E0209 19:40:55.840355 1895 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Feb 9 19:40:55.842816 kubelet[1895]: E0209 19:40:55.840645 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf45c29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560682537, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 837180764, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf45c29" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:55.842900 kubelet[1895]: E0209 19:40:55.841560 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf46845", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560685637, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 837185764, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf46845" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:56.149464 kubelet[1895]: E0209 19:40:56.149411 1895 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.15\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 19:40:56.241736 kubelet[1895]: I0209 19:40:56.241698 1895 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Feb 9 19:40:56.243171 kubelet[1895]: E0209 19:40:56.243121 1895 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.15" Feb 9 19:40:56.243385 kubelet[1895]: E0209 19:40:56.243303 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf44a94", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.15 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560678036, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 56, 241619018, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf44a94" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:56.244209 kubelet[1895]: E0209 19:40:56.244142 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf45c29", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.15 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560682537, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 56, 241654421, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf45c29" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:56.244966 kubelet[1895]: E0209 19:40:56.244899 1895 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15.17b2492a7cf46845", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.15", UID:"10.200.8.15", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.15 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.15"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 40, 55, 560685637, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 40, 56, 241661621, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.8.15.17b2492a7cf46845" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:40:56.513824 kubelet[1895]: W0209 19:40:56.513693 1895 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:40:56.513824 kubelet[1895]: E0209 19:40:56.513736 1895 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:40:56.516936 kubelet[1895]: I0209 19:40:56.516800 1895 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:40:56.525119 kubelet[1895]: E0209 19:40:56.525084 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:56.888903 kubelet[1895]: E0209 19:40:56.888756 1895 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.15" not found Feb 9 19:40:56.953840 kubelet[1895]: E0209 19:40:56.953802 1895 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.15\" not found" node="10.200.8.15" Feb 9 19:40:57.044457 kubelet[1895]: I0209 19:40:57.044420 1895 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.15" Feb 9 19:40:57.048763 kubelet[1895]: I0209 19:40:57.048726 1895 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.15" Feb 9 19:40:57.074926 kubelet[1895]: E0209 19:40:57.074861 1895 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.8.15\" not found" Feb 9 19:40:57.140000 audit[1677]: USER_END pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:57.140000 audit[1677]: CRED_DISP pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:40:57.140327 sudo[1677]: pam_unix(sudo:session): session closed for user root Feb 9 19:40:57.175850 kubelet[1895]: I0209 19:40:57.175812 1895 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:40:57.176287 env[1310]: time="2024-02-09T19:40:57.176234165Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:40:57.176821 kubelet[1895]: I0209 19:40:57.176548 1895 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:40:57.239925 sshd[1674]: pam_unix(sshd:session): session closed for user core Feb 9 19:40:57.241000 audit[1674]: USER_END pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.241000 audit[1674]: CRED_DISP pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:40:57.242983 systemd[1]: sshd@6-10.200.8.15:22-10.200.12.6:55110.service: Deactivated successfully. Feb 9 19:40:57.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.15:22-10.200.12.6:55110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:40:57.243973 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:40:57.244784 systemd-logind[1299]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:40:57.245696 systemd-logind[1299]: Removed session 9. Feb 9 19:40:57.526494 kubelet[1895]: I0209 19:40:57.526360 1895 apiserver.go:52] "Watching apiserver" Feb 9 19:40:57.527216 kubelet[1895]: E0209 19:40:57.526395 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:57.530119 kubelet[1895]: I0209 19:40:57.530091 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:40:57.530230 kubelet[1895]: I0209 19:40:57.530199 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:40:57.530302 kubelet[1895]: I0209 19:40:57.530259 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:40:57.531177 kubelet[1895]: E0209 19:40:57.531131 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:40:57.536698 systemd[1]: Created slice kubepods-besteffort-podba730684_8be7_44f6_8443_d4d0f1356200.slice. Feb 9 19:40:57.539263 kubelet[1895]: I0209 19:40:57.539229 1895 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 9 19:40:57.549044 kubelet[1895]: I0209 19:40:57.549018 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lrjs6\" (UniqueName: \"kubernetes.io/projected/ba730684-8be7-44f6-8443-d4d0f1356200-kube-api-access-lrjs6\") pod \"kube-proxy-lcw75\" (UID: \"ba730684-8be7-44f6-8443-d4d0f1356200\") " pod="kube-system/kube-proxy-lcw75" Feb 9 19:40:57.549267 kubelet[1895]: I0209 19:40:57.549254 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2952b826-df24-49c1-8bb4-0206b40c24e3-tigera-ca-bundle\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.549365 kubelet[1895]: I0209 19:40:57.549355 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/2952b826-df24-49c1-8bb4-0206b40c24e3-node-certs\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.549491 kubelet[1895]: I0209 19:40:57.549478 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/259ceaac-567c-4c4c-89bb-08c91c73fe27-kubelet-dir\") pod \"csi-node-driver-gjgzn\" (UID: \"259ceaac-567c-4c4c-89bb-08c91c73fe27\") " pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:40:57.549637 kubelet[1895]: I0209 19:40:57.549626 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/259ceaac-567c-4c4c-89bb-08c91c73fe27-socket-dir\") pod \"csi-node-driver-gjgzn\" (UID: \"259ceaac-567c-4c4c-89bb-08c91c73fe27\") " pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:40:57.549866 kubelet[1895]: I0209 19:40:57.549855 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ba730684-8be7-44f6-8443-d4d0f1356200-xtables-lock\") pod \"kube-proxy-lcw75\" (UID: \"ba730684-8be7-44f6-8443-d4d0f1356200\") " pod="kube-system/kube-proxy-lcw75" Feb 9 19:40:57.551117 systemd[1]: Created slice kubepods-besteffort-pod2952b826_df24_49c1_8bb4_0206b40c24e3.slice. Feb 9 19:40:57.554721 kubelet[1895]: I0209 19:40:57.554690 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-xtables-lock\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.555032 kubelet[1895]: I0209 19:40:57.554776 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-cni-bin-dir\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.555242 kubelet[1895]: I0209 19:40:57.555085 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-cni-net-dir\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.555470 kubelet[1895]: I0209 19:40:57.555299 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/259ceaac-567c-4c4c-89bb-08c91c73fe27-registration-dir\") pod \"csi-node-driver-gjgzn\" (UID: \"259ceaac-567c-4c4c-89bb-08c91c73fe27\") " pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:40:57.555687 kubelet[1895]: I0209 19:40:57.555672 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bzvrd\" (UniqueName: \"kubernetes.io/projected/259ceaac-567c-4c4c-89bb-08c91c73fe27-kube-api-access-bzvrd\") pod \"csi-node-driver-gjgzn\" (UID: \"259ceaac-567c-4c4c-89bb-08c91c73fe27\") " pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:40:57.555796 kubelet[1895]: I0209 19:40:57.555784 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-flexvol-driver-host\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.555938 kubelet[1895]: I0209 19:40:57.555926 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/ba730684-8be7-44f6-8443-d4d0f1356200-kube-proxy\") pod \"kube-proxy-lcw75\" (UID: \"ba730684-8be7-44f6-8443-d4d0f1356200\") " pod="kube-system/kube-proxy-lcw75" Feb 9 19:40:57.556125 kubelet[1895]: I0209 19:40:57.556111 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-lib-modules\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.556287 kubelet[1895]: I0209 19:40:57.556273 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-policysync\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.556437 kubelet[1895]: I0209 19:40:57.556424 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-var-run-calico\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.556612 kubelet[1895]: I0209 19:40:57.556599 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-var-lib-calico\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.556798 kubelet[1895]: I0209 19:40:57.556785 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/2952b826-df24-49c1-8bb4-0206b40c24e3-cni-log-dir\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.557097 kubelet[1895]: I0209 19:40:57.557080 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xqwjc\" (UniqueName: \"kubernetes.io/projected/2952b826-df24-49c1-8bb4-0206b40c24e3-kube-api-access-xqwjc\") pod \"calico-node-tvr9v\" (UID: \"2952b826-df24-49c1-8bb4-0206b40c24e3\") " pod="calico-system/calico-node-tvr9v" Feb 9 19:40:57.557245 kubelet[1895]: I0209 19:40:57.557233 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/259ceaac-567c-4c4c-89bb-08c91c73fe27-varrun\") pod \"csi-node-driver-gjgzn\" (UID: \"259ceaac-567c-4c4c-89bb-08c91c73fe27\") " pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:40:57.557397 kubelet[1895]: I0209 19:40:57.557355 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ba730684-8be7-44f6-8443-d4d0f1356200-lib-modules\") pod \"kube-proxy-lcw75\" (UID: \"ba730684-8be7-44f6-8443-d4d0f1356200\") " pod="kube-system/kube-proxy-lcw75" Feb 9 19:40:57.557556 kubelet[1895]: I0209 19:40:57.557415 1895 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:40:57.661516 kubelet[1895]: E0209 19:40:57.661475 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.661516 kubelet[1895]: W0209 19:40:57.661507 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.661806 kubelet[1895]: E0209 19:40:57.661555 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.661881 kubelet[1895]: E0209 19:40:57.661824 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.661881 kubelet[1895]: W0209 19:40:57.661837 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.661881 kubelet[1895]: E0209 19:40:57.661875 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.662160 kubelet[1895]: E0209 19:40:57.662139 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.662160 kubelet[1895]: W0209 19:40:57.662159 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.662339 kubelet[1895]: E0209 19:40:57.662183 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.662451 kubelet[1895]: E0209 19:40:57.662434 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.662546 kubelet[1895]: W0209 19:40:57.662456 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.662605 kubelet[1895]: E0209 19:40:57.662565 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.662769 kubelet[1895]: E0209 19:40:57.662737 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.662769 kubelet[1895]: W0209 19:40:57.662756 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.662918 kubelet[1895]: E0209 19:40:57.662859 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.663016 kubelet[1895]: E0209 19:40:57.663002 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.663076 kubelet[1895]: W0209 19:40:57.663016 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.663138 kubelet[1895]: E0209 19:40:57.663125 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.663271 kubelet[1895]: E0209 19:40:57.663256 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.663271 kubelet[1895]: W0209 19:40:57.663270 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.663398 kubelet[1895]: E0209 19:40:57.663299 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.663517 kubelet[1895]: E0209 19:40:57.663503 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.663582 kubelet[1895]: W0209 19:40:57.663518 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.663582 kubelet[1895]: E0209 19:40:57.663537 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.663770 kubelet[1895]: E0209 19:40:57.663747 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.663770 kubelet[1895]: W0209 19:40:57.663761 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.663872 kubelet[1895]: E0209 19:40:57.663780 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.664101 kubelet[1895]: E0209 19:40:57.664084 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.664101 kubelet[1895]: W0209 19:40:57.664100 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.664251 kubelet[1895]: E0209 19:40:57.664123 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.664318 kubelet[1895]: E0209 19:40:57.664305 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.664365 kubelet[1895]: W0209 19:40:57.664320 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.664365 kubelet[1895]: E0209 19:40:57.664334 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.664547 kubelet[1895]: E0209 19:40:57.664533 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.664609 kubelet[1895]: W0209 19:40:57.664548 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.664609 kubelet[1895]: E0209 19:40:57.664562 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.664799 kubelet[1895]: E0209 19:40:57.664774 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.664799 kubelet[1895]: W0209 19:40:57.664789 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.664908 kubelet[1895]: E0209 19:40:57.664804 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.683891 kubelet[1895]: E0209 19:40:57.683865 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.684086 kubelet[1895]: W0209 19:40:57.684064 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.684243 kubelet[1895]: E0209 19:40:57.684227 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.684734 kubelet[1895]: E0209 19:40:57.684715 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.684843 kubelet[1895]: W0209 19:40:57.684830 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.684948 kubelet[1895]: E0209 19:40:57.684938 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.685486 kubelet[1895]: E0209 19:40:57.685465 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.685611 kubelet[1895]: W0209 19:40:57.685597 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.685994 kubelet[1895]: E0209 19:40:57.685980 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.691717 kubelet[1895]: E0209 19:40:57.691695 1895 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:40:57.691717 kubelet[1895]: W0209 19:40:57.691712 1895 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:40:57.691870 kubelet[1895]: E0209 19:40:57.691735 1895 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:40:57.865970 env[1310]: time="2024-02-09T19:40:57.865898839Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lcw75,Uid:ba730684-8be7-44f6-8443-d4d0f1356200,Namespace:kube-system,Attempt:0,}" Feb 9 19:40:57.866422 env[1310]: time="2024-02-09T19:40:57.866325673Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tvr9v,Uid:2952b826-df24-49c1-8bb4-0206b40c24e3,Namespace:calico-system,Attempt:0,}" Feb 9 19:40:58.527553 kubelet[1895]: E0209 19:40:58.527505 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:58.667911 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2293002814.mount: Deactivated successfully. Feb 9 19:40:58.669006 env[1310]: time="2024-02-09T19:40:58.668959491Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.671739 env[1310]: time="2024-02-09T19:40:58.671696501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.682801 env[1310]: time="2024-02-09T19:40:58.682751249Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.685261 env[1310]: time="2024-02-09T19:40:58.685220638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.689030 env[1310]: time="2024-02-09T19:40:58.688996527Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.691891 env[1310]: time="2024-02-09T19:40:58.691856447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.695163 env[1310]: time="2024-02-09T19:40:58.695128998Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.698416 env[1310]: time="2024-02-09T19:40:58.698361846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:40:58.762297 env[1310]: time="2024-02-09T19:40:58.762214142Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:40:58.762549 env[1310]: time="2024-02-09T19:40:58.762516565Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:40:58.762706 env[1310]: time="2024-02-09T19:40:58.762670277Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:40:58.763569 env[1310]: time="2024-02-09T19:40:58.763496740Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df pid=1956 runtime=io.containerd.runc.v2 Feb 9 19:40:58.771507 env[1310]: time="2024-02-09T19:40:58.771420648Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:40:58.771711 env[1310]: time="2024-02-09T19:40:58.771686768Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:40:58.771822 env[1310]: time="2024-02-09T19:40:58.771799477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:40:58.772183 env[1310]: time="2024-02-09T19:40:58.772112101Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1b317cff245fb2bb5b0d71adb648faf4987bf28d357bc2fd8008901a56c6ac26 pid=1970 runtime=io.containerd.runc.v2 Feb 9 19:40:58.790735 systemd[1]: Started cri-containerd-a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df.scope. Feb 9 19:40:58.806012 systemd[1]: Started cri-containerd-1b317cff245fb2bb5b0d71adb648faf4987bf28d357bc2fd8008901a56c6ac26.scope. Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.814000 audit: BPF prog-id=62 op=LOAD Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1956 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653034353537636331306536633736316639613439346665623362 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1956 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653034353537636331306536633736316639613439346665623362 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit: BPF prog-id=63 op=LOAD Feb 9 19:40:58.815000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000213620 items=0 ppid=1956 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653034353537636331306536633736316639613439346665623362 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit: BPF prog-id=64 op=LOAD Feb 9 19:40:58.815000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000213668 items=0 ppid=1956 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653034353537636331306536633736316639613439346665623362 Feb 9 19:40:58.815000 audit: BPF prog-id=64 op=UNLOAD Feb 9 19:40:58.815000 audit: BPF prog-id=63 op=UNLOAD Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { perfmon } for pid=1977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit[1977]: AVC avc: denied { bpf } for pid=1977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.815000 audit: BPF prog-id=65 op=LOAD Feb 9 19:40:58.815000 audit[1977]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000213a78 items=0 ppid=1956 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138653034353537636331306536633736316639613439346665623362 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.823000 audit: BPF prog-id=66 op=LOAD Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1970 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162333137636666323435666232626235623064373161646236343866 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1970 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162333137636666323435666232626235623064373161646236343866 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit: BPF prog-id=67 op=LOAD Feb 9 19:40:58.824000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00037c5a0 items=0 ppid=1970 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162333137636666323435666232626235623064373161646236343866 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit: BPF prog-id=68 op=LOAD Feb 9 19:40:58.824000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00037c5e8 items=0 ppid=1970 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162333137636666323435666232626235623064373161646236343866 Feb 9 19:40:58.824000 audit: BPF prog-id=68 op=UNLOAD Feb 9 19:40:58.824000 audit: BPF prog-id=67 op=UNLOAD Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { perfmon } for pid=1987 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit[1987]: AVC avc: denied { bpf } for pid=1987 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:40:58.824000 audit: BPF prog-id=69 op=LOAD Feb 9 19:40:58.824000 audit[1987]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00037c9f8 items=0 ppid=1970 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:40:58.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162333137636666323435666232626235623064373161646236343866 Feb 9 19:40:58.839820 env[1310]: time="2024-02-09T19:40:58.839768989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tvr9v,Uid:2952b826-df24-49c1-8bb4-0206b40c24e3,Namespace:calico-system,Attempt:0,} returns sandbox id \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\"" Feb 9 19:40:58.842898 env[1310]: time="2024-02-09T19:40:58.842847725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:40:58.844726 env[1310]: time="2024-02-09T19:40:58.844685366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-lcw75,Uid:ba730684-8be7-44f6-8443-d4d0f1356200,Namespace:kube-system,Attempt:0,} returns sandbox id \"1b317cff245fb2bb5b0d71adb648faf4987bf28d357bc2fd8008901a56c6ac26\"" Feb 9 19:40:59.528093 kubelet[1895]: E0209 19:40:59.528062 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:40:59.600121 kubelet[1895]: E0209 19:40:59.599563 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:00.528336 kubelet[1895]: E0209 19:41:00.528289 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:01.047390 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1373648404.mount: Deactivated successfully. Feb 9 19:41:01.529518 kubelet[1895]: E0209 19:41:01.529465 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:01.600449 kubelet[1895]: E0209 19:41:01.599882 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:02.529642 kubelet[1895]: E0209 19:41:02.529590 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:02.992151 env[1310]: time="2024-02-09T19:41:02.992100385Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:02.997856 env[1310]: time="2024-02-09T19:41:02.997812380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:03.003025 env[1310]: time="2024-02-09T19:41:03.002963634Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:03.006808 env[1310]: time="2024-02-09T19:41:03.006758091Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:03.007688 env[1310]: time="2024-02-09T19:41:03.007653451Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 9 19:41:03.009195 env[1310]: time="2024-02-09T19:41:03.009165053Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 9 19:41:03.011469 env[1310]: time="2024-02-09T19:41:03.010420938Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:41:03.032901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2389268054.mount: Deactivated successfully. Feb 9 19:41:03.047623 env[1310]: time="2024-02-09T19:41:03.047569446Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e\"" Feb 9 19:41:03.048525 env[1310]: time="2024-02-09T19:41:03.048464207Z" level=info msg="StartContainer for \"656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e\"" Feb 9 19:41:03.080545 systemd[1]: Started cri-containerd-656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e.scope. Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.108103 kernel: kauditd_printk_skb: 402 callbacks suppressed Feb 9 19:41:03.108190 kernel: audit: type=1400 audit(1707507663.102:552): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1956 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.150071 kernel: audit: type=1300 audit(1707507663.102:552): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1956 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366534643736336564613635346262396662616266373934643966 Feb 9 19:41:03.150471 kernel: audit: type=1327 audit(1707507663.102:552): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366534643736336564613635346262396662616266373934643966 Feb 9 19:41:03.168332 env[1310]: time="2024-02-09T19:41:03.168278897Z" level=info msg="StartContainer for \"656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e\" returns successfully" Feb 9 19:41:03.169830 systemd[1]: cri-containerd-656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e.scope: Deactivated successfully. Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.205051 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.205170 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.220539 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.305340 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.305502 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.305541 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.305575 kernel: audit: type=1400 audit(1707507663.102:553): avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit: BPF prog-id=70 op=LOAD Feb 9 19:41:03.102000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0001bc860 items=0 ppid=1956 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366534643736336564613635346262396662616266373934643966 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit: BPF prog-id=71 op=LOAD Feb 9 19:41:03.102000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0001bc8a8 items=0 ppid=1956 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366534643736336564613635346262396662616266373934643966 Feb 9 19:41:03.102000 audit: BPF prog-id=71 op=UNLOAD Feb 9 19:41:03.102000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { perfmon } for pid=2038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit[2038]: AVC avc: denied { bpf } for pid=2038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:03.102000 audit: BPF prog-id=72 op=LOAD Feb 9 19:41:03.102000 audit[2038]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0001bc938 items=0 ppid=1956 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:03.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635366534643736336564613635346262396662616266373934643966 Feb 9 19:41:03.204000 audit: BPF prog-id=72 op=UNLOAD Feb 9 19:41:03.409279 env[1310]: time="2024-02-09T19:41:03.409228366Z" level=info msg="shim disconnected" id=656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e Feb 9 19:41:03.409279 env[1310]: time="2024-02-09T19:41:03.409274469Z" level=warning msg="cleaning up after shim disconnected" id=656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e namespace=k8s.io Feb 9 19:41:03.409279 env[1310]: time="2024-02-09T19:41:03.409286470Z" level=info msg="cleaning up dead shim" Feb 9 19:41:03.417602 env[1310]: time="2024-02-09T19:41:03.417549928Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:41:03Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2078 runtime=io.containerd.runc.v2\n" Feb 9 19:41:03.530025 kubelet[1895]: E0209 19:41:03.529976 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:03.603469 kubelet[1895]: E0209 19:41:03.599934 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:04.034257 systemd[1]: run-containerd-runc-k8s.io-656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e-runc.W5No81.mount: Deactivated successfully. Feb 9 19:41:04.034365 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-656e4d763eda654bb9fbabf794d9faad4b9886e79d983b3722bacaa134140a3e-rootfs.mount: Deactivated successfully. Feb 9 19:41:04.212415 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1527431253.mount: Deactivated successfully. Feb 9 19:41:04.530929 kubelet[1895]: E0209 19:41:04.530872 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:04.749204 env[1310]: time="2024-02-09T19:41:04.749152595Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:04.753328 env[1310]: time="2024-02-09T19:41:04.753291668Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:04.757284 env[1310]: time="2024-02-09T19:41:04.757251529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:04.759888 env[1310]: time="2024-02-09T19:41:04.759857600Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:04.760214 env[1310]: time="2024-02-09T19:41:04.760185922Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 9 19:41:04.761560 env[1310]: time="2024-02-09T19:41:04.761528410Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:41:04.762497 env[1310]: time="2024-02-09T19:41:04.762469772Z" level=info msg="CreateContainer within sandbox \"1b317cff245fb2bb5b0d71adb648faf4987bf28d357bc2fd8008901a56c6ac26\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:41:04.783252 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1454002930.mount: Deactivated successfully. Feb 9 19:41:04.797677 env[1310]: time="2024-02-09T19:41:04.797631788Z" level=info msg="CreateContainer within sandbox \"1b317cff245fb2bb5b0d71adb648faf4987bf28d357bc2fd8008901a56c6ac26\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"916258ba8a839aaeb8693f995aca3f1b43681b9690c19e308b13f23ffa7ebfa9\"" Feb 9 19:41:04.798273 env[1310]: time="2024-02-09T19:41:04.798242028Z" level=info msg="StartContainer for \"916258ba8a839aaeb8693f995aca3f1b43681b9690c19e308b13f23ffa7ebfa9\"" Feb 9 19:41:04.814707 systemd[1]: Started cri-containerd-916258ba8a839aaeb8693f995aca3f1b43681b9690c19e308b13f23ffa7ebfa9.scope. Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1970 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363235386261386138333961616562383639336639393561636133 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit: BPF prog-id=73 op=LOAD Feb 9 19:41:04.829000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003aa020 items=0 ppid=1970 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363235386261386138333961616562383639336639393561636133 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit: BPF prog-id=74 op=LOAD Feb 9 19:41:04.829000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003aa068 items=0 ppid=1970 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363235386261386138333961616562383639336639393561636133 Feb 9 19:41:04.829000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:41:04.829000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { perfmon } for pid=2103 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit[2103]: AVC avc: denied { bpf } for pid=2103 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:04.829000 audit: BPF prog-id=75 op=LOAD Feb 9 19:41:04.829000 audit[2103]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003aa0f8 items=0 ppid=1970 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931363235386261386138333961616562383639336639393561636133 Feb 9 19:41:04.849873 env[1310]: time="2024-02-09T19:41:04.849767421Z" level=info msg="StartContainer for \"916258ba8a839aaeb8693f995aca3f1b43681b9690c19e308b13f23ffa7ebfa9\" returns successfully" Feb 9 19:41:04.898000 audit[2153]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:04.898000 audit[2152]: NETFILTER_CFG table=mangle:19 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:04.898000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc995dde0 a2=0 a3=31030 items=0 ppid=2114 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:41:04.898000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0ba4aaa0 a2=0 a3=7ffd0ba4aa8c items=0 ppid=2114 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.898000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:41:04.899000 audit[2154]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:04.899000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea33b92b0 a2=0 a3=7ffea33b929c items=0 ppid=2114 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.899000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:41:04.900000 audit[2155]: NETFILTER_CFG table=nat:21 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:04.900000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffaab8c3f0 a2=0 a3=7fffaab8c3dc items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.900000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:41:04.901000 audit[2156]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:04.901000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff98a27600 a2=0 a3=7fff98a275ec items=0 ppid=2114 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:41:04.901000 audit[2157]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:04.901000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff960d5390 a2=0 a3=7fff960d537c items=0 ppid=2114 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.901000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:41:04.998000 audit[2158]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:04.998000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe812a5580 a2=0 a3=7ffe812a556c items=0 ppid=2114 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:04.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:41:05.001000 audit[2160]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.001000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe87e13170 a2=0 a3=7ffe87e1315c items=0 ppid=2114 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:41:05.005000 audit[2163]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.005000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc26dcf350 a2=0 a3=7ffc26dcf33c items=0 ppid=2114 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:41:05.006000 audit[2164]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.006000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff90647120 a2=0 a3=7fff9064710c items=0 ppid=2114 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.006000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:41:05.008000 audit[2166]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.008000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffb3f318f0 a2=0 a3=7fffb3f318dc items=0 ppid=2114 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:41:05.009000 audit[2167]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.009000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2bd04a40 a2=0 a3=7fff2bd04a2c items=0 ppid=2114 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.009000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:41:05.012000 audit[2169]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.012000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffea8945960 a2=0 a3=7ffea894594c items=0 ppid=2114 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:41:05.015000 audit[2172]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.015000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4eabd500 a2=0 a3=7ffd4eabd4ec items=0 ppid=2114 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:41:05.016000 audit[2173]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.016000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9a788310 a2=0 a3=7ffd9a7882fc items=0 ppid=2114 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:41:05.019000 audit[2175]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.019000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe9b6dde70 a2=0 a3=7ffe9b6dde5c items=0 ppid=2114 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:41:05.020000 audit[2176]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.020000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce2387490 a2=0 a3=7ffce238747c items=0 ppid=2114 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:41:05.023000 audit[2178]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.023000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7441a4f0 a2=0 a3=7fff7441a4dc items=0 ppid=2114 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.023000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:41:05.026000 audit[2181]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.026000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb08bc9c0 a2=0 a3=7ffeb08bc9ac items=0 ppid=2114 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:41:05.034000 audit[2184]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.034000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb6af95f0 a2=0 a3=7ffeb6af95dc items=0 ppid=2114 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.034000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:41:05.037000 audit[2185]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.037000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff41c7aac0 a2=0 a3=7fff41c7aaac items=0 ppid=2114 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.037000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:41:05.039000 audit[2187]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.039000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9dc7b490 a2=0 a3=7fff9dc7b47c items=0 ppid=2114 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.039000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:41:05.075000 audit[2192]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.075000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc9d069490 a2=0 a3=7ffc9d06947c items=0 ppid=2114 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:41:05.081000 audit[2197]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.081000 audit[2197]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffee8a0ce0 a2=0 a3=7fffee8a0ccc items=0 ppid=2114 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:41:05.083000 audit[2199]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:41:05.083000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcadf6d7a0 a2=0 a3=7ffcadf6d78c items=0 ppid=2114 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:41:05.089000 audit[2201]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:05.089000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd8a9ee220 a2=0 a3=7ffd8a9ee20c items=0 ppid=2114 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:05.150000 audit[2201]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:05.150000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffd8a9ee220 a2=0 a3=7ffd8a9ee20c items=0 ppid=2114 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.150000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:05.185000 audit[2209]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.185000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd6b235930 a2=0 a3=7ffd6b23591c items=0 ppid=2114 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.185000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:41:05.188000 audit[2211]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.188000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc5ae6ac60 a2=0 a3=7ffc5ae6ac4c items=0 ppid=2114 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:41:05.192000 audit[2214]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.192000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff792ff850 a2=0 a3=7fff792ff83c items=0 ppid=2114 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.192000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:41:05.193000 audit[2215]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.193000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff75cd910 a2=0 a3=7ffff75cd8fc items=0 ppid=2114 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:41:05.195000 audit[2217]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.195000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffedd8d6c30 a2=0 a3=7ffedd8d6c1c items=0 ppid=2114 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:41:05.196000 audit[2218]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.196000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe560b9f0 a2=0 a3=7fffe560b9dc items=0 ppid=2114 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:41:05.199000 audit[2220]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.199000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff4f2b3170 a2=0 a3=7fff4f2b315c items=0 ppid=2114 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.199000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:41:05.202000 audit[2223]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.202000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffedca6b6f0 a2=0 a3=7ffedca6b6dc items=0 ppid=2114 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:41:05.203000 audit[2224]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.203000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc6982a30 a2=0 a3=7ffcc6982a1c items=0 ppid=2114 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.203000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:41:05.206000 audit[2226]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.206000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd607bf1d0 a2=0 a3=7ffd607bf1bc items=0 ppid=2114 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:41:05.207000 audit[2227]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.207000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9d863170 a2=0 a3=7ffd9d86315c items=0 ppid=2114 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.207000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:41:05.209000 audit[2229]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.209000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffea48592a0 a2=0 a3=7ffea485928c items=0 ppid=2114 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:41:05.213000 audit[2232]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.213000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd80677d30 a2=0 a3=7ffd80677d1c items=0 ppid=2114 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.213000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:41:05.217000 audit[2235]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.217000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff48add120 a2=0 a3=7fff48add10c items=0 ppid=2114 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:41:05.218000 audit[2236]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.218000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe74292a10 a2=0 a3=7ffe742929fc items=0 ppid=2114 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.218000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:41:05.220000 audit[2238]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.220000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffec6e0520 a2=0 a3=7fffec6e050c items=0 ppid=2114 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:41:05.223000 audit[2241]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.223000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd31b50bc0 a2=0 a3=7ffd31b50bac items=0 ppid=2114 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:41:05.224000 audit[2242]: NETFILTER_CFG table=filter:62 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.224000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4cbfa020 a2=0 a3=7fff4cbfa00c items=0 ppid=2114 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.224000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:41:05.227000 audit[2244]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.227000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd70cf4ee0 a2=0 a3=7ffd70cf4ecc items=0 ppid=2114 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:41:05.230000 audit[2247]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.230000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc8223e200 a2=0 a3=7ffc8223e1ec items=0 ppid=2114 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:41:05.231000 audit[2248]: NETFILTER_CFG table=nat:65 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.231000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc777c3f0 a2=0 a3=7ffcc777c3dc items=0 ppid=2114 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:41:05.233000 audit[2250]: NETFILTER_CFG table=nat:66 family=10 entries=2 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:41:05.233000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffdfc59ea30 a2=0 a3=7ffdfc59ea1c items=0 ppid=2114 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:41:05.236000 audit[2252]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:41:05.236000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffdd8c994e0 a2=0 a3=7ffdd8c994cc items=0 ppid=2114 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.236000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:05.237000 audit[2252]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:41:05.237000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffdd8c994e0 a2=0 a3=7ffdd8c994cc items=0 ppid=2114 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:05.237000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:05.531380 kubelet[1895]: E0209 19:41:05.531308 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:05.601579 kubelet[1895]: E0209 19:41:05.600406 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:05.628803 kubelet[1895]: I0209 19:41:05.628765 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-lcw75" podStartSLOduration=2.713869207 podCreationTimestamp="2024-02-09 19:40:57 +0000 UTC" firstStartedPulling="2024-02-09 19:40:58.845676942 +0000 UTC m=+3.722261365" lastFinishedPulling="2024-02-09 19:41:04.760534145 +0000 UTC m=+9.637118668" observedRunningTime="2024-02-09 19:41:05.62871981 +0000 UTC m=+10.505304233" watchObservedRunningTime="2024-02-09 19:41:05.62872651 +0000 UTC m=+10.505311033" Feb 9 19:41:06.532305 kubelet[1895]: E0209 19:41:06.532263 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:06.701626 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2501279758.mount: Deactivated successfully. Feb 9 19:41:07.533200 kubelet[1895]: E0209 19:41:07.533139 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:07.599936 kubelet[1895]: E0209 19:41:07.599401 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:08.533492 kubelet[1895]: E0209 19:41:08.533449 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:09.533787 kubelet[1895]: E0209 19:41:09.533746 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:09.600226 kubelet[1895]: E0209 19:41:09.599640 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:10.534535 kubelet[1895]: E0209 19:41:10.534485 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:11.535347 kubelet[1895]: E0209 19:41:11.535286 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:11.599815 kubelet[1895]: E0209 19:41:11.599434 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:12.535728 kubelet[1895]: E0209 19:41:12.535689 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:13.536392 kubelet[1895]: E0209 19:41:13.536323 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:13.599791 kubelet[1895]: E0209 19:41:13.599750 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:14.537335 kubelet[1895]: E0209 19:41:14.537287 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:15.002936 env[1310]: time="2024-02-09T19:41:15.002877506Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:15.009448 env[1310]: time="2024-02-09T19:41:15.009395936Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:15.013124 env[1310]: time="2024-02-09T19:41:15.013066222Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:15.018133 env[1310]: time="2024-02-09T19:41:15.018085177Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:15.018878 env[1310]: time="2024-02-09T19:41:15.018831614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 9 19:41:15.021167 env[1310]: time="2024-02-09T19:41:15.021134631Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:41:15.063656 env[1310]: time="2024-02-09T19:41:15.063588981Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea\"" Feb 9 19:41:15.064649 env[1310]: time="2024-02-09T19:41:15.064585532Z" level=info msg="StartContainer for \"98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea\"" Feb 9 19:41:15.093100 systemd[1]: Started cri-containerd-98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea.scope. Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.114972 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 19:41:15.115090 kernel: audit: type=1400 audit(1707507675.110:616): avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1956 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.148172 kernel: audit: type=1300 audit(1707507675.110:616): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1956 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938633265646564313435626539376139636630306137396237646561 Feb 9 19:41:15.169975 kernel: audit: type=1327 audit(1707507675.110:616): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938633265646564313435626539376139636630306137396237646561 Feb 9 19:41:15.170084 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.175944 env[1310]: time="2024-02-09T19:41:15.175899470Z" level=info msg="StartContainer for \"98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea\" returns successfully" Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.195997 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.208448 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.208561 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.237404 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.252400 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.267426 kernel: audit: type=1400 audit(1707507675.110:617): avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.110000 audit: BPF prog-id=76 op=LOAD Feb 9 19:41:15.110000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0003623a0 items=0 ppid=1956 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938633265646564313435626539376139636630306137396237646561 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.127000 audit: BPF prog-id=77 op=LOAD Feb 9 19:41:15.127000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0003623e8 items=0 ppid=1956 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938633265646564313435626539376139636630306137396237646561 Feb 9 19:41:15.147000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:41:15.147000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:15.147000 audit: BPF prog-id=78 op=LOAD Feb 9 19:41:15.147000 audit[2261]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c000362478 items=0 ppid=1956 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:15.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938633265646564313435626539376139636630306137396237646561 Feb 9 19:41:15.524518 kubelet[1895]: E0209 19:41:15.524398 1895 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:15.538745 kubelet[1895]: E0209 19:41:15.538698 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:15.600416 kubelet[1895]: E0209 19:41:15.600177 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:16.047726 systemd[1]: run-containerd-runc-k8s.io-98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea-runc.5mJO7K.mount: Deactivated successfully. Feb 9 19:41:16.539534 kubelet[1895]: E0209 19:41:16.539473 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:16.884985 env[1310]: time="2024-02-09T19:41:16.884897225Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:41:16.887883 systemd[1]: cri-containerd-98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea.scope: Deactivated successfully. Feb 9 19:41:16.890000 audit: BPF prog-id=78 op=UNLOAD Feb 9 19:41:16.902911 kubelet[1895]: I0209 19:41:16.901953 1895 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:41:16.915038 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea-rootfs.mount: Deactivated successfully. Feb 9 19:41:17.540306 kubelet[1895]: E0209 19:41:17.540251 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:17.606198 systemd[1]: Created slice kubepods-besteffort-pod259ceaac_567c_4c4c_89bb_08c91c73fe27.slice. Feb 9 19:41:17.609167 env[1310]: time="2024-02-09T19:41:17.609125416Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjgzn,Uid:259ceaac-567c-4c4c-89bb-08c91c73fe27,Namespace:calico-system,Attempt:0,}" Feb 9 19:41:18.541061 kubelet[1895]: E0209 19:41:18.541005 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:19.218170 env[1310]: time="2024-02-09T19:41:19.218122784Z" level=info msg="shim disconnected" id=98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea Feb 9 19:41:19.218170 env[1310]: time="2024-02-09T19:41:19.218164486Z" level=warning msg="cleaning up after shim disconnected" id=98c2eded145be97a9cf00a79b7deaf24578ddc7d65b3d3587268c6bcfab40fea namespace=k8s.io Feb 9 19:41:19.218170 env[1310]: time="2024-02-09T19:41:19.218175787Z" level=info msg="cleaning up dead shim" Feb 9 19:41:19.228254 env[1310]: time="2024-02-09T19:41:19.228110347Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:41:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2308 runtime=io.containerd.runc.v2\n" Feb 9 19:41:19.293963 env[1310]: time="2024-02-09T19:41:19.293889593Z" level=error msg="Failed to destroy network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.297081 env[1310]: time="2024-02-09T19:41:19.295797081Z" level=error msg="encountered an error cleaning up failed sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.297081 env[1310]: time="2024-02-09T19:41:19.295866285Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjgzn,Uid:259ceaac-567c-4c4c-89bb-08c91c73fe27,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.296280 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3-shm.mount: Deactivated successfully. Feb 9 19:41:19.297343 kubelet[1895]: E0209 19:41:19.296156 1895 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.297343 kubelet[1895]: E0209 19:41:19.296216 1895 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:41:19.297343 kubelet[1895]: E0209 19:41:19.296242 1895 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gjgzn" Feb 9 19:41:19.297473 kubelet[1895]: E0209 19:41:19.296300 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gjgzn_calico-system(259ceaac-567c-4c4c-89bb-08c91c73fe27)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gjgzn_calico-system(259ceaac-567c-4c4c-89bb-08c91c73fe27)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:19.388388 kubelet[1895]: I0209 19:41:19.388338 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:19.393999 systemd[1]: Created slice kubepods-besteffort-pod5615fb48_b195_4055_9bc4_63167ed931d1.slice. Feb 9 19:41:19.418045 kubelet[1895]: I0209 19:41:19.418004 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wg7lb\" (UniqueName: \"kubernetes.io/projected/5615fb48-b195-4055-9bc4-63167ed931d1-kube-api-access-wg7lb\") pod \"nginx-deployment-845c78c8b9-h4pgl\" (UID: \"5615fb48-b195-4055-9bc4-63167ed931d1\") " pod="default/nginx-deployment-845c78c8b9-h4pgl" Feb 9 19:41:19.541915 kubelet[1895]: E0209 19:41:19.541820 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:19.651552 env[1310]: time="2024-02-09T19:41:19.651504754Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:41:19.652189 kubelet[1895]: I0209 19:41:19.652159 1895 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:19.652820 env[1310]: time="2024-02-09T19:41:19.652787714Z" level=info msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" Feb 9 19:41:19.681190 env[1310]: time="2024-02-09T19:41:19.681132026Z" level=error msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" failed" error="failed to destroy network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.681688 kubelet[1895]: E0209 19:41:19.681651 1895 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:19.681820 kubelet[1895]: E0209 19:41:19.681722 1895 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3} Feb 9 19:41:19.681820 kubelet[1895]: E0209 19:41:19.681787 1895 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"259ceaac-567c-4c4c-89bb-08c91c73fe27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:41:19.681956 kubelet[1895]: E0209 19:41:19.681838 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"259ceaac-567c-4c4c-89bb-08c91c73fe27\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gjgzn" podUID=259ceaac-567c-4c4c-89bb-08c91c73fe27 Feb 9 19:41:19.697830 env[1310]: time="2024-02-09T19:41:19.697792898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h4pgl,Uid:5615fb48-b195-4055-9bc4-63167ed931d1,Namespace:default,Attempt:0,}" Feb 9 19:41:19.775456 env[1310]: time="2024-02-09T19:41:19.775392092Z" level=error msg="Failed to destroy network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.775787 env[1310]: time="2024-02-09T19:41:19.775745608Z" level=error msg="encountered an error cleaning up failed sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.775871 env[1310]: time="2024-02-09T19:41:19.775808511Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h4pgl,Uid:5615fb48-b195-4055-9bc4-63167ed931d1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.776173 kubelet[1895]: E0209 19:41:19.776149 1895 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:19.776273 kubelet[1895]: E0209 19:41:19.776208 1895 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-h4pgl" Feb 9 19:41:19.776273 kubelet[1895]: E0209 19:41:19.776236 1895 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-845c78c8b9-h4pgl" Feb 9 19:41:19.776358 kubelet[1895]: E0209 19:41:19.776301 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-845c78c8b9-h4pgl_default(5615fb48-b195-4055-9bc4-63167ed931d1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-845c78c8b9-h4pgl_default(5615fb48-b195-4055-9bc4-63167ed931d1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-h4pgl" podUID=5615fb48-b195-4055-9bc4-63167ed931d1 Feb 9 19:41:20.237166 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a-shm.mount: Deactivated successfully. Feb 9 19:41:20.542958 kubelet[1895]: E0209 19:41:20.542823 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:20.654918 kubelet[1895]: I0209 19:41:20.654360 1895 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:20.655227 env[1310]: time="2024-02-09T19:41:20.655183883Z" level=info msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" Feb 9 19:41:20.679772 env[1310]: time="2024-02-09T19:41:20.679699594Z" level=error msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" failed" error="failed to destroy network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:41:20.680045 kubelet[1895]: E0209 19:41:20.680023 1895 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:20.680147 kubelet[1895]: E0209 19:41:20.680076 1895 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a} Feb 9 19:41:20.680147 kubelet[1895]: E0209 19:41:20.680135 1895 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5615fb48-b195-4055-9bc4-63167ed931d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:41:20.680278 kubelet[1895]: E0209 19:41:20.680173 1895 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5615fb48-b195-4055-9bc4-63167ed931d1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-845c78c8b9-h4pgl" podUID=5615fb48-b195-4055-9bc4-63167ed931d1 Feb 9 19:41:21.543933 kubelet[1895]: E0209 19:41:21.543886 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:22.545022 kubelet[1895]: E0209 19:41:22.544960 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:23.546083 kubelet[1895]: E0209 19:41:23.546026 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:24.546290 kubelet[1895]: E0209 19:41:24.546230 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:25.547141 kubelet[1895]: E0209 19:41:25.547098 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:26.547514 kubelet[1895]: E0209 19:41:26.547467 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:27.548326 kubelet[1895]: E0209 19:41:27.548286 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:27.855062 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4187930563.mount: Deactivated successfully. Feb 9 19:41:27.947607 env[1310]: time="2024-02-09T19:41:27.947543604Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.952235 env[1310]: time="2024-02-09T19:41:27.952184885Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.955715 env[1310]: time="2024-02-09T19:41:27.955673622Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.958733 env[1310]: time="2024-02-09T19:41:27.958693140Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:27.959239 env[1310]: time="2024-02-09T19:41:27.959202760Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 9 19:41:27.973842 env[1310]: time="2024-02-09T19:41:27.973791431Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:41:28.005357 env[1310]: time="2024-02-09T19:41:28.005295760Z" level=info msg="CreateContainer within sandbox \"a8e04557cc10e6c761f9a494feb3b76c2fffe36ee2cb8f1678b5e6d3e04368df\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a\"" Feb 9 19:41:28.006138 env[1310]: time="2024-02-09T19:41:28.006100691Z" level=info msg="StartContainer for \"69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a\"" Feb 9 19:41:28.024800 systemd[1]: Started cri-containerd-69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a.scope. Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.051431 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:41:28.051553 kernel: audit: type=1400 audit(1707507688.043:623): avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1956 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:28.085144 env[1310]: time="2024-02-09T19:41:28.085088520Z" level=info msg="StartContainer for \"69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a\" returns successfully" Feb 9 19:41:28.086409 kernel: audit: type=1300 audit(1707507688.043:623): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1956 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:28.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656365306434626564363337306535333062353938376663383932 Feb 9 19:41:28.105949 kernel: audit: type=1327 audit(1707507688.043:623): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656365306434626564363337306535333062353938376663383932 Feb 9 19:41:28.119951 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.137407 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.137540 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.158866 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.172302 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.198794 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.198936 kernel: audit: type=1400 audit(1707507688.043:624): avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit: BPF prog-id=79 op=LOAD Feb 9 19:41:28.043000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002ebc70 items=0 ppid=1956 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:28.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656365306434626564363337306535333062353938376663383932 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit: BPF prog-id=80 op=LOAD Feb 9 19:41:28.043000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002ebcb8 items=0 ppid=1956 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:28.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656365306434626564363337306535333062353938376663383932 Feb 9 19:41:28.043000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:41:28.043000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:28.043000 audit: BPF prog-id=81 op=LOAD Feb 9 19:41:28.043000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002ebd48 items=0 ppid=1956 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:28.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639656365306434626564363337306535333062353938376663383932 Feb 9 19:41:28.463751 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:41:28.463928 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:41:28.549184 kubelet[1895]: E0209 19:41:28.549125 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:28.691873 kubelet[1895]: I0209 19:41:28.691827 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tvr9v" podStartSLOduration=2.574124961 podCreationTimestamp="2024-02-09 19:40:57 +0000 UTC" firstStartedPulling="2024-02-09 19:40:58.841882751 +0000 UTC m=+3.718467174" lastFinishedPulling="2024-02-09 19:41:27.959506172 +0000 UTC m=+32.836090595" observedRunningTime="2024-02-09 19:41:28.691238063 +0000 UTC m=+33.567822586" watchObservedRunningTime="2024-02-09 19:41:28.691748382 +0000 UTC m=+33.568332905" Feb 9 19:41:29.549646 kubelet[1895]: E0209 19:41:29.549590 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:29.693551 systemd[1]: run-containerd-runc-k8s.io-69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a-runc.UR5MXE.mount: Deactivated successfully. Feb 9 19:41:29.875000 audit[2572]: AVC avc: denied { write } for pid=2572 comm="tee" name="fd" dev="proc" ino=22486 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.875000 audit[2572]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff835f796b a2=241 a3=1b6 items=1 ppid=2540 pid=2572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.875000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:41:29.875000 audit: PATH item=0 name="/dev/fd/63" inode=22449 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.875000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.880000 audit[2583]: AVC avc: denied { write } for pid=2583 comm="tee" name="fd" dev="proc" ino=22493 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.880000 audit[2583]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcceadd97c a2=241 a3=1b6 items=1 ppid=2541 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.880000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:41:29.880000 audit: PATH item=0 name="/dev/fd/63" inode=22474 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.880000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.885000 audit[2596]: AVC avc: denied { write } for pid=2596 comm="tee" name="fd" dev="proc" ino=23215 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.885000 audit[2596]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffee6a597b a2=241 a3=1b6 items=1 ppid=2557 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.885000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:41:29.885000 audit: PATH item=0 name="/dev/fd/63" inode=23209 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.885000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.892000 audit[2599]: AVC avc: denied { write } for pid=2599 comm="tee" name="fd" dev="proc" ino=22497 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.892000 audit[2599]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1b26297a a2=241 a3=1b6 items=1 ppid=2560 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.892000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:41:29.892000 audit: PATH item=0 name="/dev/fd/63" inode=22490 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.896000 audit[2601]: AVC avc: denied { write } for pid=2601 comm="tee" name="fd" dev="proc" ino=23225 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.892000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.900000 audit[2605]: AVC avc: denied { write } for pid=2605 comm="tee" name="fd" dev="proc" ino=23228 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.896000 audit[2601]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe90a7197a a2=241 a3=1b6 items=1 ppid=2565 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.896000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:41:29.896000 audit: PATH item=0 name="/dev/fd/63" inode=23212 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.900000 audit[2605]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf9c8a96a a2=241 a3=1b6 items=1 ppid=2556 pid=2605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.900000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:41:29.900000 audit: PATH item=0 name="/dev/fd/63" inode=23219 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.900000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:29.906000 audit[2607]: AVC avc: denied { write } for pid=2607 comm="tee" name="fd" dev="proc" ino=22504 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:41:29.906000 audit[2607]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd237a697a a2=241 a3=1b6 items=1 ppid=2566 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:29.906000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:41:29.906000 audit: PATH item=0 name="/dev/fd/63" inode=23222 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:41:29.906000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:41:30.102404 kernel: Initializing XFRM netlink socket Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.269000 audit: BPF prog-id=82 op=LOAD Feb 9 19:41:30.269000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe853a3790 a2=70 a3=7f721a85a000 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.269000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.270000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit: BPF prog-id=83 op=LOAD Feb 9 19:41:30.270000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe853a3790 a2=70 a3=6e items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.270000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe853a3740 a2=70 a3=7ffe853a3790 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit: BPF prog-id=84 op=LOAD Feb 9 19:41:30.270000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe853a3720 a2=70 a3=7ffe853a3790 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.270000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:41:30.270000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.270000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe853a3800 a2=70 a3=0 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.270000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.272000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.272000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe853a37f0 a2=70 a3=0 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.272000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.272000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffe853a3830 a2=70 a3=0 items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.273000 audit: BPF prog-id=85 op=LOAD Feb 9 19:41:30.273000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe853a3750 a2=70 a3=ffffffff items=0 ppid=2569 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.273000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:41:30.277000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.277000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefa91ce40 a2=70 a3=fff80800 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.277000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:41:30.279000 audit[2681]: AVC avc: denied { bpf } for pid=2681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:30.279000 audit[2681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffefa91cd10 a2=70 a3=3 items=0 ppid=2569 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.279000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:41:30.285000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:41:30.404000 audit[2705]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:30.404000 audit[2705]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fff0347cb70 a2=0 a3=7fff0347cb5c items=0 ppid=2569 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.404000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:30.409000 audit[2706]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:30.409000 audit[2706]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffecaf35d50 a2=0 a3=55bf7dc4f000 items=0 ppid=2569 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.409000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:30.410000 audit[2704]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:30.410000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffd34e33900 a2=0 a3=55613d9fe000 items=0 ppid=2569 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.410000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:30.416000 audit[2703]: NETFILTER_CFG table=raw:72 family=2 entries=19 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:30.416000 audit[2703]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffb79e09b0 a2=0 a3=55ed7ffe4000 items=0 ppid=2569 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:30.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:30.550470 kubelet[1895]: E0209 19:41:30.550317 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:31.160003 systemd-networkd[1457]: vxlan.calico: Link UP Feb 9 19:41:31.160014 systemd-networkd[1457]: vxlan.calico: Gained carrier Feb 9 19:41:31.551260 kubelet[1895]: E0209 19:41:31.551124 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:31.601502 env[1310]: time="2024-02-09T19:41:31.600938804Z" level=info msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] k8s.go 578: Cleaning up netns ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" iface="eth0" netns="/var/run/netns/cni-7a054b96-a379-96de-00cc-f9ddfa635d94" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" iface="eth0" netns="/var/run/netns/cni-7a054b96-a379-96de-00cc-f9ddfa635d94" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" iface="eth0" netns="/var/run/netns/cni-7a054b96-a379-96de-00cc-f9ddfa635d94" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] k8s.go 585: Releasing IP address(es) ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.647 [INFO][2732] utils.go 188: Calico CNI releasing IP address ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.665 [INFO][2738] ipam_plugin.go 415: Releasing address using handleID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.666 [INFO][2738] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.666 [INFO][2738] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.673 [WARNING][2738] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.673 [INFO][2738] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.674 [INFO][2738] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:31.677122 env[1310]: 2024-02-09 19:41:31.675 [INFO][2732] k8s.go 591: Teardown processing complete. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:31.679779 systemd[1]: run-netns-cni\x2d7a054b96\x2da379\x2d96de\x2d00cc\x2df9ddfa635d94.mount: Deactivated successfully. Feb 9 19:41:31.680755 env[1310]: time="2024-02-09T19:41:31.680500581Z" level=info msg="TearDown network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" successfully" Feb 9 19:41:31.680755 env[1310]: time="2024-02-09T19:41:31.680543882Z" level=info msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" returns successfully" Feb 9 19:41:31.681176 env[1310]: time="2024-02-09T19:41:31.681141904Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjgzn,Uid:259ceaac-567c-4c4c-89bb-08c91c73fe27,Namespace:calico-system,Attempt:1,}" Feb 9 19:41:31.812500 systemd-networkd[1457]: califa36a7b117e: Link UP Feb 9 19:41:31.822405 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:41:31.822518 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califa36a7b117e: link becomes ready Feb 9 19:41:31.825088 systemd-networkd[1457]: califa36a7b117e: Gained carrier Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.748 [INFO][2744] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-csi--node--driver--gjgzn-eth0 csi-node-driver- calico-system 259ceaac-567c-4c4c-89bb-08c91c73fe27 1312 0 2024-02-09 19:40:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 csi-node-driver-gjgzn eth0 default [] [] [kns.calico-system ksa.calico-system.default] califa36a7b117e [] []}} ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.748 [INFO][2744] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.774 [INFO][2756] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" HandleID="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.785 [INFO][2756] ipam_plugin.go 268: Auto assigning IP ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" HandleID="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d950), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.15", "pod":"csi-node-driver-gjgzn", "timestamp":"2024-02-09 19:41:31.774385675 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.785 [INFO][2756] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.785 [INFO][2756] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.785 [INFO][2756] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.787 [INFO][2756] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.790 [INFO][2756] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.795 [INFO][2756] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.796 [INFO][2756] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.798 [INFO][2756] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.798 [INFO][2756] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.800 [INFO][2756] ipam.go 1682: Creating new handle: k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21 Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.803 [INFO][2756] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.807 [INFO][2756] ipam.go 1216: Successfully claimed IPs: [192.168.44.65/26] block=192.168.44.64/26 handle="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.807 [INFO][2756] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.65/26] handle="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" host="10.200.8.15" Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.807 [INFO][2756] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:31.834491 env[1310]: 2024-02-09 19:41:31.807 [INFO][2756] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.44.65/26] IPv6=[] ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" HandleID="k8s-pod-network.bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.809 [INFO][2744] k8s.go 385: Populated endpoint ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--gjgzn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259ceaac-567c-4c4c-89bb-08c91c73fe27", ResourceVersion:"1312", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 40, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"csi-node-driver-gjgzn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califa36a7b117e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.809 [INFO][2744] k8s.go 386: Calico CNI using IPs: [192.168.44.65/32] ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.809 [INFO][2744] dataplane_linux.go 68: Setting the host side veth name to califa36a7b117e ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.824 [INFO][2744] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.825 [INFO][2744] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--gjgzn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259ceaac-567c-4c4c-89bb-08c91c73fe27", ResourceVersion:"1312", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 40, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21", Pod:"csi-node-driver-gjgzn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califa36a7b117e", MAC:"82:38:20:a7:d9:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:31.838614 env[1310]: 2024-02-09 19:41:31.832 [INFO][2744] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21" Namespace="calico-system" Pod="csi-node-driver-gjgzn" WorkloadEndpoint="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:31.859442 env[1310]: time="2024-02-09T19:41:31.858098302Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:31.859442 env[1310]: time="2024-02-09T19:41:31.858142804Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:31.859442 env[1310]: time="2024-02-09T19:41:31.858165505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:31.859442 env[1310]: time="2024-02-09T19:41:31.858281709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21 pid=2784 runtime=io.containerd.runc.v2 Feb 9 19:41:31.874000 audit[2800]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:31.874000 audit[2800]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd0d8bd250 a2=0 a3=7ffd0d8bd23c items=0 ppid=2569 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.874000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:31.882248 systemd[1]: Started cri-containerd-bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21.scope. Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.900000 audit: BPF prog-id=86 op=LOAD Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653865656131653037363765626139656435336661653264306561 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653865656131653037363765626139656435336661653264306561 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit: BPF prog-id=87 op=LOAD Feb 9 19:41:31.901000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000927d0 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653865656131653037363765626139656435336661653264306561 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit: BPF prog-id=88 op=LOAD Feb 9 19:41:31.901000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000092818 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653865656131653037363765626139656435336661653264306561 Feb 9 19:41:31.901000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:41:31.901000 audit: BPF prog-id=87 op=UNLOAD Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:31.901000 audit: BPF prog-id=89 op=LOAD Feb 9 19:41:31.901000 audit[2794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000092c28 items=0 ppid=2784 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:31.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261653865656131653037363765626139656435336661653264306561 Feb 9 19:41:31.918009 env[1310]: time="2024-02-09T19:41:31.917964767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gjgzn,Uid:259ceaac-567c-4c4c-89bb-08c91c73fe27,Namespace:calico-system,Attempt:1,} returns sandbox id \"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21\"" Feb 9 19:41:31.919822 env[1310]: time="2024-02-09T19:41:31.919757432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:41:32.513687 systemd-networkd[1457]: vxlan.calico: Gained IPv6LL Feb 9 19:41:32.551880 kubelet[1895]: E0209 19:41:32.551834 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:32.600771 env[1310]: time="2024-02-09T19:41:32.600708543Z" level=info msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" Feb 9 19:41:32.679932 systemd[1]: run-containerd-runc-k8s.io-bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21-runc.k1LwKG.mount: Deactivated successfully. Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.642 [INFO][2838] k8s.go 578: Cleaning up netns ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.643 [INFO][2838] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" iface="eth0" netns="/var/run/netns/cni-23018bc1-11eb-2a1d-479d-ec28f93abe63" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.643 [INFO][2838] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" iface="eth0" netns="/var/run/netns/cni-23018bc1-11eb-2a1d-479d-ec28f93abe63" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.643 [INFO][2838] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" iface="eth0" netns="/var/run/netns/cni-23018bc1-11eb-2a1d-479d-ec28f93abe63" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.643 [INFO][2838] k8s.go 585: Releasing IP address(es) ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.643 [INFO][2838] utils.go 188: Calico CNI releasing IP address ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.663 [INFO][2844] ipam_plugin.go 415: Releasing address using handleID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.663 [INFO][2844] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.664 [INFO][2844] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.711 [WARNING][2844] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.711 [INFO][2844] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.735 [INFO][2844] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:32.737924 env[1310]: 2024-02-09 19:41:32.736 [INFO][2838] k8s.go 591: Teardown processing complete. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:32.742487 env[1310]: time="2024-02-09T19:41:32.740995820Z" level=info msg="TearDown network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" successfully" Feb 9 19:41:32.742487 env[1310]: time="2024-02-09T19:41:32.741050422Z" level=info msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" returns successfully" Feb 9 19:41:32.742487 env[1310]: time="2024-02-09T19:41:32.741992555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h4pgl,Uid:5615fb48-b195-4055-9bc4-63167ed931d1,Namespace:default,Attempt:1,}" Feb 9 19:41:32.740705 systemd[1]: run-netns-cni\x2d23018bc1\x2d11eb\x2d2a1d\x2d479d\x2dec28f93abe63.mount: Deactivated successfully. Feb 9 19:41:32.893222 systemd-networkd[1457]: calib45d58d6061: Link UP Feb 9 19:41:32.904892 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:41:32.904987 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib45d58d6061: link becomes ready Feb 9 19:41:32.905731 systemd-networkd[1457]: calib45d58d6061: Gained carrier Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.828 [INFO][2850] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0 nginx-deployment-845c78c8b9- default 5615fb48-b195-4055-9bc4-63167ed931d1 1320 0 2024-02-09 19:41:19 +0000 UTC map[app:nginx pod-template-hash:845c78c8b9 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 nginx-deployment-845c78c8b9-h4pgl eth0 default [] [] [kns.default ksa.default.default] calib45d58d6061 [] []}} ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.828 [INFO][2850] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.854 [INFO][2864] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" HandleID="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.865 [INFO][2864] ipam_plugin.go 268: Auto assigning IP ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" HandleID="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cad0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"nginx-deployment-845c78c8b9-h4pgl", "timestamp":"2024-02-09 19:41:32.854738055 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.865 [INFO][2864] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.865 [INFO][2864] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.865 [INFO][2864] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.867 [INFO][2864] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.870 [INFO][2864] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.874 [INFO][2864] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.876 [INFO][2864] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.878 [INFO][2864] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.878 [INFO][2864] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.880 [INFO][2864] ipam.go 1682: Creating new handle: k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.884 [INFO][2864] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.889 [INFO][2864] ipam.go 1216: Successfully claimed IPs: [192.168.44.66/26] block=192.168.44.64/26 handle="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.889 [INFO][2864] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.66/26] handle="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" host="10.200.8.15" Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.889 [INFO][2864] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:32.913886 env[1310]: 2024-02-09 19:41:32.889 [INFO][2864] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.44.66/26] IPv6=[] ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" HandleID="k8s-pod-network.c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.890 [INFO][2850] k8s.go 385: Populated endpoint ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5615fb48-b195-4055-9bc4-63167ed931d1", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"nginx-deployment-845c78c8b9-h4pgl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib45d58d6061", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.890 [INFO][2850] k8s.go 386: Calico CNI using IPs: [192.168.44.66/32] ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.890 [INFO][2850] dataplane_linux.go 68: Setting the host side veth name to calib45d58d6061 ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.905 [INFO][2850] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.906 [INFO][2850] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5615fb48-b195-4055-9bc4-63167ed931d1", ResourceVersion:"1320", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c", Pod:"nginx-deployment-845c78c8b9-h4pgl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib45d58d6061", MAC:"46:b9:f8:63:42:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:32.914865 env[1310]: 2024-02-09 19:41:32.912 [INFO][2850] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c" Namespace="default" Pod="nginx-deployment-845c78c8b9-h4pgl" WorkloadEndpoint="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:32.933000 audit[2889]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2889 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:32.933000 audit[2889]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffe2c6098a0 a2=0 a3=7ffe2c60988c items=0 ppid=2569 pid=2889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.933000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:32.935977 env[1310]: time="2024-02-09T19:41:32.935904434Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:32.936092 env[1310]: time="2024-02-09T19:41:32.935989937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:32.936092 env[1310]: time="2024-02-09T19:41:32.936019738Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:32.936235 env[1310]: time="2024-02-09T19:41:32.936185744Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c pid=2893 runtime=io.containerd.runc.v2 Feb 9 19:41:32.954067 systemd[1]: Started cri-containerd-c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c.scope. Feb 9 19:41:32.962489 systemd-networkd[1457]: califa36a7b117e: Gained IPv6LL Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.966000 audit: BPF prog-id=90 op=LOAD Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2893 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396438666366376131373565376139373933623636396563636563 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2893 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396438666366376131373565376139373933623636396563636563 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit: BPF prog-id=91 op=LOAD Feb 9 19:41:32.967000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d0140 items=0 ppid=2893 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396438666366376131373565376139373933623636396563636563 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit: BPF prog-id=92 op=LOAD Feb 9 19:41:32.967000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d0188 items=0 ppid=2893 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396438666366376131373565376139373933623636396563636563 Feb 9 19:41:32.967000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:41:32.967000 audit: BPF prog-id=91 op=UNLOAD Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { perfmon } for pid=2902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit[2902]: AVC avc: denied { bpf } for pid=2902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:32.967000 audit: BPF prog-id=93 op=LOAD Feb 9 19:41:32.967000 audit[2902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d0598 items=0 ppid=2893 pid=2902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:32.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331396438666366376131373565376139373933623636396563636563 Feb 9 19:41:32.998595 env[1310]: time="2024-02-09T19:41:32.998550656Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-845c78c8b9-h4pgl,Uid:5615fb48-b195-4055-9bc4-63167ed931d1,Namespace:default,Attempt:1,} returns sandbox id \"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c\"" Feb 9 19:41:33.552158 kubelet[1895]: E0209 19:41:33.552096 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:34.015850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1745851755.mount: Deactivated successfully. Feb 9 19:41:34.178661 systemd-networkd[1457]: calib45d58d6061: Gained IPv6LL Feb 9 19:41:34.552516 kubelet[1895]: E0209 19:41:34.552470 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:35.082089 env[1310]: time="2024-02-09T19:41:35.082031942Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:35.090255 env[1310]: time="2024-02-09T19:41:35.090208016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:35.095682 env[1310]: time="2024-02-09T19:41:35.095639198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:35.100234 env[1310]: time="2024-02-09T19:41:35.100196551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:35.100733 env[1310]: time="2024-02-09T19:41:35.100699168Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 9 19:41:35.101756 env[1310]: time="2024-02-09T19:41:35.101723002Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:41:35.103122 env[1310]: time="2024-02-09T19:41:35.103090748Z" level=info msg="CreateContainer within sandbox \"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:41:35.131872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1451512796.mount: Deactivated successfully. Feb 9 19:41:35.148980 env[1310]: time="2024-02-09T19:41:35.148913285Z" level=info msg="CreateContainer within sandbox \"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"e6419099ce4489195e26caed0345b88d8faa3db36541bb308ed49e0970fe6a38\"" Feb 9 19:41:35.149955 env[1310]: time="2024-02-09T19:41:35.149911819Z" level=info msg="StartContainer for \"e6419099ce4489195e26caed0345b88d8faa3db36541bb308ed49e0970fe6a38\"" Feb 9 19:41:35.179858 systemd[1]: Started cri-containerd-e6419099ce4489195e26caed0345b88d8faa3db36541bb308ed49e0970fe6a38.scope. Feb 9 19:41:35.212447 kernel: kauditd_printk_skb: 271 callbacks suppressed Feb 9 19:41:35.212618 kernel: audit: type=1400 audit(1707507695.192:692): avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.192000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.232082 kernel: audit: type=1300 audit(1707507695.192:692): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2784 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:35.192000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2784 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:35.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343139303939636534343839313935653236636165643033343562 Feb 9 19:41:35.251470 kernel: audit: type=1327 audit(1707507695.192:692): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343139303939636534343839313935653236636165643033343562 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.283718 env[1310]: time="2024-02-09T19:41:35.283670106Z" level=info msg="StartContainer for \"e6419099ce4489195e26caed0345b88d8faa3db36541bb308ed49e0970fe6a38\" returns successfully" Feb 9 19:41:35.288487 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.288655 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.288690 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.303411 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.332535 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.332677 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.360792 kernel: audit: type=1400 audit(1707507695.193:693): avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.193000 audit: BPF prog-id=94 op=LOAD Feb 9 19:41:35.193000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fbf40 items=0 ppid=2784 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:35.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343139303939636534343839313935653236636165643033343562 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit: BPF prog-id=95 op=LOAD Feb 9 19:41:35.211000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000fbf88 items=0 ppid=2784 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:35.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343139303939636534343839313935653236636165643033343562 Feb 9 19:41:35.211000 audit: BPF prog-id=95 op=UNLOAD Feb 9 19:41:35.211000 audit: BPF prog-id=94 op=UNLOAD Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { perfmon } for pid=2938 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit[2938]: AVC avc: denied { bpf } for pid=2938 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:35.211000 audit: BPF prog-id=96 op=LOAD Feb 9 19:41:35.211000 audit[2938]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003cc018 items=0 ppid=2784 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:35.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6536343139303939636534343839313935653236636165643033343562 Feb 9 19:41:35.524167 kubelet[1895]: E0209 19:41:35.524108 1895 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:35.552701 kubelet[1895]: E0209 19:41:35.552639 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:36.553117 kubelet[1895]: E0209 19:41:36.553062 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:37.554120 kubelet[1895]: E0209 19:41:37.554066 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:38.554690 kubelet[1895]: E0209 19:41:38.554620 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:39.118354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4125509450.mount: Deactivated successfully. Feb 9 19:41:39.555627 kubelet[1895]: E0209 19:41:39.555214 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:40.044409 env[1310]: time="2024-02-09T19:41:40.044341350Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:40.051033 env[1310]: time="2024-02-09T19:41:40.050980754Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:40.054632 env[1310]: time="2024-02-09T19:41:40.054591664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:40.060004 env[1310]: time="2024-02-09T19:41:40.059874727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:40.060365 env[1310]: time="2024-02-09T19:41:40.060330941Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:41:40.063182 env[1310]: time="2024-02-09T19:41:40.063147027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:41:40.063941 env[1310]: time="2024-02-09T19:41:40.063910251Z" level=info msg="CreateContainer within sandbox \"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:41:40.105683 env[1310]: time="2024-02-09T19:41:40.105618132Z" level=info msg="CreateContainer within sandbox \"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"18eb689404eec9d660c82f9345b33e6c5da0bb837a411bd70b2fdd53138c9cd0\"" Feb 9 19:41:40.106359 env[1310]: time="2024-02-09T19:41:40.106321353Z" level=info msg="StartContainer for \"18eb689404eec9d660c82f9345b33e6c5da0bb837a411bd70b2fdd53138c9cd0\"" Feb 9 19:41:40.126242 systemd[1]: Started cri-containerd-18eb689404eec9d660c82f9345b33e6c5da0bb837a411bd70b2fdd53138c9cd0.scope. Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit: BPF prog-id=97 op=LOAD Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2893 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138656236383934303465656339643636306338326639333435623333 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2893 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138656236383934303465656339643636306338326639333435623333 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit: BPF prog-id=98 op=LOAD Feb 9 19:41:40.146000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000bf2e0 items=0 ppid=2893 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138656236383934303465656339643636306338326639333435623333 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit: BPF prog-id=99 op=LOAD Feb 9 19:41:40.146000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000bf328 items=0 ppid=2893 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138656236383934303465656339643636306338326639333435623333 Feb 9 19:41:40.146000 audit: BPF prog-id=99 op=UNLOAD Feb 9 19:41:40.146000 audit: BPF prog-id=98 op=UNLOAD Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:40.146000 audit: BPF prog-id=100 op=LOAD Feb 9 19:41:40.146000 audit[2983]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000bf738 items=0 ppid=2893 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:40.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138656236383934303465656339643636306338326639333435623333 Feb 9 19:41:40.164841 env[1310]: time="2024-02-09T19:41:40.164802350Z" level=info msg="StartContainer for \"18eb689404eec9d660c82f9345b33e6c5da0bb837a411bd70b2fdd53138c9cd0\" returns successfully" Feb 9 19:41:40.555478 kubelet[1895]: E0209 19:41:40.555422 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:40.717701 kubelet[1895]: I0209 19:41:40.717658 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-845c78c8b9-h4pgl" podStartSLOduration=14.656288967 podCreationTimestamp="2024-02-09 19:41:19 +0000 UTC" firstStartedPulling="2024-02-09 19:41:33.000007508 +0000 UTC m=+37.876591931" lastFinishedPulling="2024-02-09 19:41:40.061346872 +0000 UTC m=+44.937931295" observedRunningTime="2024-02-09 19:41:40.712146362 +0000 UTC m=+45.588730785" watchObservedRunningTime="2024-02-09 19:41:40.717628331 +0000 UTC m=+45.594212854" Feb 9 19:41:41.555664 kubelet[1895]: E0209 19:41:41.555598 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:42.476405 env[1310]: time="2024-02-09T19:41:42.476342459Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:42.483109 env[1310]: time="2024-02-09T19:41:42.483064359Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:42.487080 env[1310]: time="2024-02-09T19:41:42.487046077Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:42.491144 env[1310]: time="2024-02-09T19:41:42.491107397Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:42.491613 env[1310]: time="2024-02-09T19:41:42.491581212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 9 19:41:42.493555 env[1310]: time="2024-02-09T19:41:42.493524369Z" level=info msg="CreateContainer within sandbox \"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:41:42.519935 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3942793701.mount: Deactivated successfully. Feb 9 19:41:42.534523 env[1310]: time="2024-02-09T19:41:42.534467285Z" level=info msg="CreateContainer within sandbox \"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fb18a7526d7807b38bd48150e04e5c89d1c98adb3ce1ad06d6329d2fc0b15a1e\"" Feb 9 19:41:42.535290 env[1310]: time="2024-02-09T19:41:42.535259909Z" level=info msg="StartContainer for \"fb18a7526d7807b38bd48150e04e5c89d1c98adb3ce1ad06d6329d2fc0b15a1e\"" Feb 9 19:41:42.556733 kubelet[1895]: E0209 19:41:42.556681 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:42.562407 systemd[1]: Started cri-containerd-fb18a7526d7807b38bd48150e04e5c89d1c98adb3ce1ad06d6329d2fc0b15a1e.scope. Feb 9 19:41:42.593810 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 19:41:42.593979 kernel: audit: type=1400 audit(1707507702.576:716): avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613642 kernel: audit: type=1300 audit(1707507702.576:716): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2784 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.576000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2784 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.631784 kernel: audit: type=1327 audit(1707507702.576:716): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662313861373532366437383037623338626434383135306530346535 Feb 9 19:41:42.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662313861373532366437383037623338626434383135306530346535 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.645400 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.671221 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.671656 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.671681 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.698634 env[1310]: time="2024-02-09T19:41:42.698593061Z" level=info msg="StartContainer for \"fb18a7526d7807b38bd48150e04e5c89d1c98adb3ce1ad06d6329d2fc0b15a1e\" returns successfully" Feb 9 19:41:42.703869 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.719845 kubelet[1895]: I0209 19:41:42.719821 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-gjgzn" podStartSLOduration=35.147218886 podCreationTimestamp="2024-02-09 19:40:57 +0000 UTC" firstStartedPulling="2024-02-09 19:41:31.919311816 +0000 UTC m=+36.795896239" lastFinishedPulling="2024-02-09 19:41:42.49188032 +0000 UTC m=+47.368464843" observedRunningTime="2024-02-09 19:41:42.719019467 +0000 UTC m=+47.595603990" watchObservedRunningTime="2024-02-09 19:41:42.71978749 +0000 UTC m=+47.596371913" Feb 9 19:41:42.728406 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.728505 kernel: audit: type=1400 audit(1707507702.576:717): avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.576000 audit: BPF prog-id=101 op=LOAD Feb 9 19:41:42.576000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003d8100 items=0 ppid=2784 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.576000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662313861373532366437383037623338626434383135306530346535 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.613000 audit: BPF prog-id=102 op=LOAD Feb 9 19:41:42.613000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003d8148 items=0 ppid=2784 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662313861373532366437383037623338626434383135306530346535 Feb 9 19:41:42.631000 audit: BPF prog-id=102 op=UNLOAD Feb 9 19:41:42.631000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { perfmon } for pid=3044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit[3044]: AVC avc: denied { bpf } for pid=3044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:42.631000 audit: BPF prog-id=103 op=LOAD Feb 9 19:41:42.631000 audit[3044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003d81d8 items=0 ppid=2784 pid=3044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:42.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662313861373532366437383037623338626434383135306530346535 Feb 9 19:41:43.557734 kubelet[1895]: E0209 19:41:43.557678 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:43.633967 kubelet[1895]: I0209 19:41:43.633928 1895 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:41:43.633967 kubelet[1895]: I0209 19:41:43.633980 1895 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:41:44.558431 kubelet[1895]: E0209 19:41:44.558360 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:45.559003 kubelet[1895]: E0209 19:41:45.558952 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:46.559560 kubelet[1895]: E0209 19:41:46.559503 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:47.560650 kubelet[1895]: E0209 19:41:47.560589 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:48.561446 kubelet[1895]: E0209 19:41:48.561391 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:49.321000 audit[3076]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.327277 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 19:41:49.327393 kernel: audit: type=1325 audit(1707507709.321:722): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.321000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffef6981c00 a2=0 a3=7ffef6981bec items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.340211 kernel: audit: type=1300 audit(1707507709.321:722): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffef6981c00 a2=0 a3=7ffef6981bec items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.340285 kubelet[1895]: I0209 19:41:49.339702 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:41:49.344458 systemd[1]: Created slice kubepods-besteffort-pod76a4cd7a_9d24_400f_b5bf_0a740a405f0a.slice. Feb 9 19:41:49.321000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.364000 audit[3076]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.386900 kernel: audit: type=1327 audit(1707507709.321:722): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.387055 kernel: audit: type=1325 audit(1707507709.364:723): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3076 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.387085 kernel: audit: type=1300 audit(1707507709.364:723): arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffef6981c00 a2=0 a3=31030 items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.364000 audit[3076]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffef6981c00 a2=0 a3=31030 items=0 ppid=2114 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.418071 kernel: audit: type=1327 audit(1707507709.364:723): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.415000 audit[3080]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.415000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc56ddb9a0 a2=0 a3=7ffc56ddb98c items=0 ppid=2114 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.430071 kubelet[1895]: I0209 19:41:49.429687 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/76a4cd7a-9d24-400f-b5bf-0a740a405f0a-data\") pod \"nfs-server-provisioner-0\" (UID: \"76a4cd7a-9d24-400f-b5bf-0a740a405f0a\") " pod="default/nfs-server-provisioner-0" Feb 9 19:41:49.430071 kubelet[1895]: I0209 19:41:49.429739 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-stprg\" (UniqueName: \"kubernetes.io/projected/76a4cd7a-9d24-400f-b5bf-0a740a405f0a-kube-api-access-stprg\") pod \"nfs-server-provisioner-0\" (UID: \"76a4cd7a-9d24-400f-b5bf-0a740a405f0a\") " pod="default/nfs-server-provisioner-0" Feb 9 19:41:49.430601 kernel: audit: type=1325 audit(1707507709.415:724): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.430653 kernel: audit: type=1300 audit(1707507709.415:724): arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffc56ddb9a0 a2=0 a3=7ffc56ddb98c items=0 ppid=2114 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.415000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.458681 kernel: audit: type=1327 audit(1707507709.415:724): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.458000 audit[3080]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.458000 audit[3080]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffc56ddb9a0 a2=0 a3=31030 items=0 ppid=2114 pid=3080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:49.470400 kernel: audit: type=1325 audit(1707507709.458:725): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3080 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:49.562307 kubelet[1895]: E0209 19:41:49.562258 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:49.649063 env[1310]: time="2024-02-09T19:41:49.649015912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:76a4cd7a-9d24-400f-b5bf-0a740a405f0a,Namespace:default,Attempt:0,}" Feb 9 19:41:49.795200 systemd-networkd[1457]: cali60e51b789ff: Link UP Feb 9 19:41:49.802419 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:41:49.809399 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:41:49.810175 systemd-networkd[1457]: cali60e51b789ff: Gained carrier Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.728 [INFO][3082] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 76a4cd7a-9d24-400f-b5bf-0a740a405f0a 1393 0 2024-02-09 19:41:49 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.15 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.728 [INFO][3082] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.754 [INFO][3094] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" HandleID="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.765 [INFO][3094] ipam_plugin.go 268: Auto assigning IP ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" HandleID="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000502e0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:41:49.754234313 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.765 [INFO][3094] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.765 [INFO][3094] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.765 [INFO][3094] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.767 [INFO][3094] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.770 [INFO][3094] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.774 [INFO][3094] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.775 [INFO][3094] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.777 [INFO][3094] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.777 [INFO][3094] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.779 [INFO][3094] ipam.go 1682: Creating new handle: k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.782 [INFO][3094] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.787 [INFO][3094] ipam.go 1216: Successfully claimed IPs: [192.168.44.67/26] block=192.168.44.64/26 handle="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.787 [INFO][3094] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.67/26] handle="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" host="10.200.8.15" Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.787 [INFO][3094] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:49.816975 env[1310]: 2024-02-09 19:41:49.787 [INFO][3094] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.44.67/26] IPv6=[] ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" HandleID="k8s-pod-network.f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Workload="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.825714 env[1310]: 2024-02-09 19:41:49.788 [INFO][3082] k8s.go 385: Populated endpoint ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"76a4cd7a-9d24-400f-b5bf-0a740a405f0a", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.44.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:49.825714 env[1310]: 2024-02-09 19:41:49.788 [INFO][3082] k8s.go 386: Calico CNI using IPs: [192.168.44.67/32] ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.825714 env[1310]: 2024-02-09 19:41:49.788 [INFO][3082] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.825714 env[1310]: 2024-02-09 19:41:49.809 [INFO][3082] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.825937 env[1310]: 2024-02-09 19:41:49.809 [INFO][3082] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"76a4cd7a-9d24-400f-b5bf-0a740a405f0a", ResourceVersion:"1393", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.44.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"92:c1:17:a4:e9:43", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:49.825937 env[1310]: 2024-02-09 19:41:49.815 [INFO][3082] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.15-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:41:49.841000 audit[3116]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:41:49.841000 audit[3116]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7ffe9fc4dab0 a2=0 a3=7ffe9fc4da9c items=0 ppid=2569 pid=3116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.841000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:41:49.846774 env[1310]: time="2024-02-09T19:41:49.846695875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:41:49.846922 env[1310]: time="2024-02-09T19:41:49.846747377Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:41:49.846922 env[1310]: time="2024-02-09T19:41:49.846761077Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:41:49.847278 env[1310]: time="2024-02-09T19:41:49.847190289Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec pid=3125 runtime=io.containerd.runc.v2 Feb 9 19:41:49.875623 systemd[1]: Started cri-containerd-f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec.scope. Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.887000 audit: BPF prog-id=104 op=LOAD Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3125 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366631623763663238366632626130326331653035333237636461 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3125 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366631623763663238366632626130326331653035333237636461 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit: BPF prog-id=105 op=LOAD Feb 9 19:41:49.888000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000250a20 items=0 ppid=3125 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366631623763663238366632626130326331653035333237636461 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit: BPF prog-id=106 op=LOAD Feb 9 19:41:49.888000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000250a68 items=0 ppid=3125 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366631623763663238366632626130326331653035333237636461 Feb 9 19:41:49.888000 audit: BPF prog-id=106 op=UNLOAD Feb 9 19:41:49.888000 audit: BPF prog-id=105 op=UNLOAD Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:49.888000 audit: BPF prog-id=107 op=LOAD Feb 9 19:41:49.888000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000250e78 items=0 ppid=3125 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636366631623763663238366632626130326331653035333237636461 Feb 9 19:41:49.919836 env[1310]: time="2024-02-09T19:41:49.919732920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:76a4cd7a-9d24-400f-b5bf-0a740a405f0a,Namespace:default,Attempt:0,} returns sandbox id \"f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec\"" Feb 9 19:41:49.923689 env[1310]: time="2024-02-09T19:41:49.923632524Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:41:50.542542 systemd[1]: run-containerd-runc-k8s.io-f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec-runc.JlRp6o.mount: Deactivated successfully. Feb 9 19:41:50.562951 kubelet[1895]: E0209 19:41:50.562901 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:51.201657 systemd-networkd[1457]: cali60e51b789ff: Gained IPv6LL Feb 9 19:41:51.563669 kubelet[1895]: E0209 19:41:51.563251 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:52.564219 kubelet[1895]: E0209 19:41:52.564172 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:52.646217 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4105758058.mount: Deactivated successfully. Feb 9 19:41:53.564851 kubelet[1895]: E0209 19:41:53.564803 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:54.565100 kubelet[1895]: E0209 19:41:54.565051 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:54.939456 env[1310]: time="2024-02-09T19:41:54.939398534Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:54.944936 env[1310]: time="2024-02-09T19:41:54.944890770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:54.948435 env[1310]: time="2024-02-09T19:41:54.948394857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:54.951639 env[1310]: time="2024-02-09T19:41:54.951606636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:41:54.952218 env[1310]: time="2024-02-09T19:41:54.952183151Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 9 19:41:54.954531 env[1310]: time="2024-02-09T19:41:54.954501108Z" level=info msg="CreateContainer within sandbox \"f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:41:54.978341 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount416016791.mount: Deactivated successfully. Feb 9 19:41:54.993697 env[1310]: time="2024-02-09T19:41:54.993639379Z" level=info msg="CreateContainer within sandbox \"f66f1b7cf286f2ba02c1e05327cda8c470bb5331700be50c119f00adefb913ec\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"b34b931e6d6319416f2fb7dd594e32d292506b76ade03f75df4f3b09cc8f2465\"" Feb 9 19:41:54.994468 env[1310]: time="2024-02-09T19:41:54.994431399Z" level=info msg="StartContainer for \"b34b931e6d6319416f2fb7dd594e32d292506b76ade03f75df4f3b09cc8f2465\"" Feb 9 19:41:55.017187 systemd[1]: Started cri-containerd-b34b931e6d6319416f2fb7dd594e32d292506b76ade03f75df4f3b09cc8f2465.scope. Feb 9 19:41:55.049163 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 19:41:55.049326 kernel: audit: type=1400 audit(1707507715.029:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.049359 kernel: audit: type=1400 audit(1707507715.029:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.078049 kernel: audit: type=1400 audit(1707507715.029:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.092767 kernel: audit: type=1400 audit(1707507715.029:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.109400 kernel: audit: type=1400 audit(1707507715.029:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.137994 kernel: audit: type=1400 audit(1707507715.029:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.138143 kernel: audit: type=1400 audit(1707507715.029:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.153489 kernel: audit: type=1400 audit(1707507715.029:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.181695 kernel: audit: type=1400 audit(1707507715.029:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.181833 kernel: audit: type=1400 audit(1707507715.061:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.061000 audit: BPF prog-id=108 op=LOAD Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3125 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233346239333165366436333139343136663266623764643539346533 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3125 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233346239333165366436333139343136663266623764643539346533 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.066000 audit: BPF prog-id=109 op=LOAD Feb 9 19:41:55.066000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003da370 items=0 ppid=3125 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233346239333165366436333139343136663266623764643539346533 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.077000 audit: BPF prog-id=110 op=LOAD Feb 9 19:41:55.077000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003da3b8 items=0 ppid=3125 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233346239333165366436333139343136663266623764643539346533 Feb 9 19:41:55.091000 audit: BPF prog-id=110 op=UNLOAD Feb 9 19:41:55.091000 audit: BPF prog-id=109 op=UNLOAD Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:41:55.091000 audit: BPF prog-id=111 op=LOAD Feb 9 19:41:55.091000 audit[3175]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003da7c8 items=0 ppid=3125 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233346239333165366436333139343136663266623764643539346533 Feb 9 19:41:55.184510 env[1310]: time="2024-02-09T19:41:55.184453854Z" level=info msg="StartContainer for \"b34b931e6d6319416f2fb7dd594e32d292506b76ade03f75df4f3b09cc8f2465\" returns successfully" Feb 9 19:41:55.181000 audit[3205]: AVC avc: denied { search } for pid=3205 comm="rpcbind" name="crypto" dev="proc" ino=26010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:41:55.181000 audit[3205]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fd34a86c0c0 a2=0 a3=0 items=0 ppid=3188 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 key=(null) Feb 9 19:41:55.181000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:41:55.235000 audit[3210]: AVC avc: denied { search } for pid=3210 comm="dbus-daemon" name="crypto" dev="proc" ino=26010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:41:55.235000 audit[3210]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fa619d2f0c0 a2=0 a3=0 items=0 ppid=3188 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 key=(null) Feb 9 19:41:55.235000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:41:55.240000 audit[3211]: AVC avc: denied { watch } for pid=3211 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c229,c502 tclass=dir permissive=0 Feb 9 19:41:55.240000 audit[3211]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=558bab3e2d30 a2=2c8 a3=7ffcc3227f0c items=0 ppid=3188 pid=3211 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 key=(null) Feb 9 19:41:55.240000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:41:55.244000 audit[3212]: AVC avc: denied { read } for pid=3212 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26092 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:41:55.244000 audit[3212]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f1788845320 a1=80000 a2=d a3=7ffe2b0639e0 items=0 ppid=3188 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 key=(null) Feb 9 19:41:55.244000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:41:55.245000 audit[3212]: AVC avc: denied { search } for pid=3212 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:41:55.245000 audit[3212]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f1787d990c0 a2=0 a3=0 items=0 ppid=3188 pid=3212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c502 key=(null) Feb 9 19:41:55.245000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:41:55.524417 kubelet[1895]: E0209 19:41:55.524275 1895 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:55.532687 env[1310]: time="2024-02-09T19:41:55.532644778Z" level=info msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" Feb 9 19:41:55.565879 kubelet[1895]: E0209 19:41:55.565835 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.571 [WARNING][3228] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--gjgzn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259ceaac-567c-4c4c-89bb-08c91c73fe27", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 40, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21", Pod:"csi-node-driver-gjgzn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califa36a7b117e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.571 [INFO][3228] k8s.go 578: Cleaning up netns ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.571 [INFO][3228] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" iface="eth0" netns="" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.571 [INFO][3228] k8s.go 585: Releasing IP address(es) ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.571 [INFO][3228] utils.go 188: Calico CNI releasing IP address ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.595 [INFO][3234] ipam_plugin.go 415: Releasing address using handleID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.597 [INFO][3234] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.597 [INFO][3234] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.608 [WARNING][3234] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.608 [INFO][3234] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.610 [INFO][3234] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:55.612440 env[1310]: 2024-02-09 19:41:55.611 [INFO][3228] k8s.go 591: Teardown processing complete. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.612440 env[1310]: time="2024-02-09T19:41:55.612408131Z" level=info msg="TearDown network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" successfully" Feb 9 19:41:55.612440 env[1310]: time="2024-02-09T19:41:55.612447032Z" level=info msg="StopPodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" returns successfully" Feb 9 19:41:55.613147 env[1310]: time="2024-02-09T19:41:55.613055747Z" level=info msg="RemovePodSandbox for \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" Feb 9 19:41:55.613147 env[1310]: time="2024-02-09T19:41:55.613093348Z" level=info msg="Forcibly stopping sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\"" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.648 [WARNING][3255] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-csi--node--driver--gjgzn-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"259ceaac-567c-4c4c-89bb-08c91c73fe27", ResourceVersion:"1357", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 40, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"bae8eea1e0767eba9ed53fae2d0ea83d02483c84c33910e836ec9e49ffb64c21", Pod:"csi-node-driver-gjgzn", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"califa36a7b117e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.648 [INFO][3255] k8s.go 578: Cleaning up netns ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.648 [INFO][3255] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" iface="eth0" netns="" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.648 [INFO][3255] k8s.go 585: Releasing IP address(es) ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.648 [INFO][3255] utils.go 188: Calico CNI releasing IP address ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.679 [INFO][3261] ipam_plugin.go 415: Releasing address using handleID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.679 [INFO][3261] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.679 [INFO][3261] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.686 [WARNING][3261] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.686 [INFO][3261] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" HandleID="k8s-pod-network.a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Workload="10.200.8.15-k8s-csi--node--driver--gjgzn-eth0" Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.688 [INFO][3261] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:55.690187 env[1310]: 2024-02-09 19:41:55.689 [INFO][3255] k8s.go 591: Teardown processing complete. ContainerID="a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3" Feb 9 19:41:55.690866 env[1310]: time="2024-02-09T19:41:55.690231537Z" level=info msg="TearDown network for sandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" successfully" Feb 9 19:41:55.698460 env[1310]: time="2024-02-09T19:41:55.698416537Z" level=info msg="RemovePodSandbox \"a191c1d9b286b4ac54cf094a2362ec3d60f14648b089d1efa19e2a07e62128f3\" returns successfully" Feb 9 19:41:55.698977 env[1310]: time="2024-02-09T19:41:55.698947650Z" level=info msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.733 [WARNING][3279] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5615fb48-b195-4055-9bc4-63167ed931d1", ResourceVersion:"1348", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c", Pod:"nginx-deployment-845c78c8b9-h4pgl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib45d58d6061", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.733 [INFO][3279] k8s.go 578: Cleaning up netns ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.733 [INFO][3279] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" iface="eth0" netns="" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.733 [INFO][3279] k8s.go 585: Releasing IP address(es) ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.733 [INFO][3279] utils.go 188: Calico CNI releasing IP address ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.751 [INFO][3285] ipam_plugin.go 415: Releasing address using handleID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.751 [INFO][3285] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.751 [INFO][3285] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.758 [WARNING][3285] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.758 [INFO][3285] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.760 [INFO][3285] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:55.761835 env[1310]: 2024-02-09 19:41:55.760 [INFO][3279] k8s.go 591: Teardown processing complete. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.762576 env[1310]: time="2024-02-09T19:41:55.761869590Z" level=info msg="TearDown network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" successfully" Feb 9 19:41:55.762576 env[1310]: time="2024-02-09T19:41:55.761906091Z" level=info msg="StopPodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" returns successfully" Feb 9 19:41:55.762576 env[1310]: time="2024-02-09T19:41:55.762495806Z" level=info msg="RemovePodSandbox for \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" Feb 9 19:41:55.762576 env[1310]: time="2024-02-09T19:41:55.762530407Z" level=info msg="Forcibly stopping sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\"" Feb 9 19:41:55.786282 kubelet[1895]: I0209 19:41:55.786163 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.756818738 podCreationTimestamp="2024-02-09 19:41:49 +0000 UTC" firstStartedPulling="2024-02-09 19:41:49.923211113 +0000 UTC m=+54.799795536" lastFinishedPulling="2024-02-09 19:41:54.952508959 +0000 UTC m=+59.829093482" observedRunningTime="2024-02-09 19:41:55.785579071 +0000 UTC m=+60.662163594" watchObservedRunningTime="2024-02-09 19:41:55.786116684 +0000 UTC m=+60.662701107" Feb 9 19:41:55.798000 audit[3312]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.798000 audit[3312]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff59506b00 a2=0 a3=7fff59506aec items=0 ppid=2114 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:55.801000 audit[3312]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3312 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:41:55.801000 audit[3312]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7fff59506b00 a2=0 a3=7fff59506aec items=0 ppid=2114 pid=3312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:41:55.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.815 [WARNING][3305] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0", GenerateName:"nginx-deployment-845c78c8b9-", Namespace:"default", SelfLink:"", UID:"5615fb48-b195-4055-9bc4-63167ed931d1", ResourceVersion:"1348", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"845c78c8b9", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"c19d8fcf7a175e7a9793b669eccec46e0828aa86b5645543a43be8688a8ffd0c", Pod:"nginx-deployment-845c78c8b9-h4pgl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calib45d58d6061", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.816 [INFO][3305] k8s.go 578: Cleaning up netns ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.816 [INFO][3305] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" iface="eth0" netns="" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.816 [INFO][3305] k8s.go 585: Releasing IP address(es) ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.816 [INFO][3305] utils.go 188: Calico CNI releasing IP address ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.833 [INFO][3315] ipam_plugin.go 415: Releasing address using handleID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.833 [INFO][3315] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.833 [INFO][3315] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.854 [WARNING][3315] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.854 [INFO][3315] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" HandleID="k8s-pod-network.3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Workload="10.200.8.15-k8s-nginx--deployment--845c78c8b9--h4pgl-eth0" Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.856 [INFO][3315] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:41:55.857880 env[1310]: 2024-02-09 19:41:55.856 [INFO][3305] k8s.go 591: Teardown processing complete. ContainerID="3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a" Feb 9 19:41:55.858666 env[1310]: time="2024-02-09T19:41:55.857915742Z" level=info msg="TearDown network for sandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" successfully" Feb 9 19:41:55.864648 env[1310]: time="2024-02-09T19:41:55.864606606Z" level=info msg="RemovePodSandbox \"3988d6b1f31f6146b6f69f125357f7056c1f1a071dd6bb726ee4aaf00e1c8e1a\" returns successfully" Feb 9 19:41:55.975078 systemd[1]: run-containerd-runc-k8s.io-b34b931e6d6319416f2fb7dd594e32d292506b76ade03f75df4f3b09cc8f2465-runc.B1irAA.mount: Deactivated successfully. Feb 9 19:41:56.566493 kubelet[1895]: E0209 19:41:56.566446 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:57.567306 kubelet[1895]: E0209 19:41:57.567255 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:57.694045 systemd[1]: run-containerd-runc-k8s.io-69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a-runc.LbMdfA.mount: Deactivated successfully. Feb 9 19:41:58.568263 kubelet[1895]: E0209 19:41:58.568198 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:41:59.569272 kubelet[1895]: E0209 19:41:59.569218 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:00.570364 kubelet[1895]: E0209 19:42:00.570316 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:01.571143 kubelet[1895]: E0209 19:42:01.571090 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:02.571603 kubelet[1895]: E0209 19:42:02.571549 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:03.572072 kubelet[1895]: E0209 19:42:03.572018 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:04.572478 kubelet[1895]: E0209 19:42:04.572420 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:05.572663 kubelet[1895]: E0209 19:42:05.572608 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:06.573282 kubelet[1895]: E0209 19:42:06.573222 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:07.573470 kubelet[1895]: E0209 19:42:07.573419 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:08.574312 kubelet[1895]: E0209 19:42:08.574261 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:09.575045 kubelet[1895]: E0209 19:42:09.574985 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:10.575157 kubelet[1895]: E0209 19:42:10.575102 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:11.576141 kubelet[1895]: E0209 19:42:11.575985 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:12.577186 kubelet[1895]: E0209 19:42:12.577133 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:13.577573 kubelet[1895]: E0209 19:42:13.577524 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:14.578582 kubelet[1895]: E0209 19:42:14.578521 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:15.524955 kubelet[1895]: E0209 19:42:15.524902 1895 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:15.579319 kubelet[1895]: E0209 19:42:15.579251 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:16.580105 kubelet[1895]: E0209 19:42:16.580043 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:17.580478 kubelet[1895]: E0209 19:42:17.580429 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:18.581217 kubelet[1895]: E0209 19:42:18.581156 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:19.581330 kubelet[1895]: E0209 19:42:19.581285 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:20.582386 kubelet[1895]: E0209 19:42:20.582310 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:20.875066 kubelet[1895]: I0209 19:42:20.875026 1895 topology_manager.go:212] "Topology Admit Handler" Feb 9 19:42:20.881182 systemd[1]: Created slice kubepods-besteffort-podfe48e63c_baf0_4a3b_a4ff_8b38d4b747e1.slice. Feb 9 19:42:21.021998 kubelet[1895]: I0209 19:42:21.021947 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-40a62365-9f30-44cd-831c-792680745166\" (UniqueName: \"kubernetes.io/nfs/fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1-pvc-40a62365-9f30-44cd-831c-792680745166\") pod \"test-pod-1\" (UID: \"fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1\") " pod="default/test-pod-1" Feb 9 19:42:21.022314 kubelet[1895]: I0209 19:42:21.022291 1895 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2n5vq\" (UniqueName: \"kubernetes.io/projected/fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1-kube-api-access-2n5vq\") pod \"test-pod-1\" (UID: \"fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1\") " pod="default/test-pod-1" Feb 9 19:42:21.198864 kernel: Failed to create system directory netfs Feb 9 19:42:21.200468 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:42:21.201195 kernel: audit: type=1400 audit(1707507741.192:770): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.192000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.221745 kernel: Failed to create system directory netfs Feb 9 19:42:21.221847 kernel: audit: type=1400 audit(1707507741.192:770): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.192000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.241621 kernel: Failed to create system directory netfs Feb 9 19:42:21.241739 kernel: audit: type=1400 audit(1707507741.192:770): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.192000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.260797 kernel: Failed to create system directory netfs Feb 9 19:42:21.260906 kernel: audit: type=1400 audit(1707507741.192:770): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.192000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.192000 audit[3375]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55684328d5e0 a1=153bc a2=5568413c22b0 a3=5 items=0 ppid=9 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:21.192000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:42:21.308749 kernel: audit: type=1300 audit(1707507741.192:770): arch=c000003e syscall=175 success=yes exit=0 a0=55684328d5e0 a1=153bc a2=5568413c22b0 a3=5 items=0 ppid=9 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:21.308876 kernel: audit: type=1327 audit(1707507741.192:770): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:42:21.342334 kernel: Failed to create system directory fscache Feb 9 19:42:21.342483 kernel: audit: type=1400 audit(1707507741.319:771): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.342514 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.361897 kernel: audit: type=1400 audit(1707507741.319:771): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.362020 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.381440 kernel: audit: type=1400 audit(1707507741.319:771): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.381568 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.401255 kernel: audit: type=1400 audit(1707507741.319:771): avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.401411 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.407824 kernel: Failed to create system directory fscache Feb 9 19:42:21.407923 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.414443 kernel: Failed to create system directory fscache Feb 9 19:42:21.414495 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.420958 kernel: Failed to create system directory fscache Feb 9 19:42:21.421036 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.431075 kernel: Failed to create system directory fscache Feb 9 19:42:21.431152 kernel: Failed to create system directory fscache Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.319000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.438972 kernel: Failed to create system directory fscache Feb 9 19:42:21.439038 kernel: FS-Cache: Loaded Feb 9 19:42:21.319000 audit[3375]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5568434a29c0 a1=4c0fc a2=5568413c22b0 a3=5 items=0 ppid=9 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:21.319000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.499118 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.499223 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.499245 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.505319 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.505411 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.511498 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.511571 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.517749 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.517881 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.523940 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.524009 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.529888 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.529961 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.535755 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.535837 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.541926 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.541990 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.545517 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.550810 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.550859 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.557879 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.557943 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.563441 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.563498 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.568805 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.568863 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.575315 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.575608 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.582618 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.582694 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.582863 kubelet[1895]: E0209 19:42:21.582817 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:21.587812 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.597659 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.597735 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.604033 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.608533 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.615709 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.615771 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.622795 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.623270 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.632354 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.632441 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.641245 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.641309 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.647260 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.647310 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.654068 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.654242 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.659449 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.659524 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.665983 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.666046 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.669443 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.674075 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.677337 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.682279 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.684735 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.687400 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.691011 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.697950 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.698029 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.704614 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.704687 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.711312 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.716487 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.716544 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.723576 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.724323 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.730015 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.730087 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.736438 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.736499 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.741659 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.741742 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.749108 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.749192 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.754389 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.756433 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.764144 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.764215 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.769588 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.769642 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.777366 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.777460 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.783150 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.783210 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.790486 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.790542 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.794701 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.802502 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.802580 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.806088 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.812668 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.812748 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.817917 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.817967 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.823130 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.823197 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.831859 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.831922 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.837931 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.838008 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.843443 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.843500 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.857202 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.857288 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.864358 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.866245 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.867750 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.871565 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.880384 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.880445 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.884453 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.889402 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.896215 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.896274 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.899797 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.903674 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.909453 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.909520 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.918514 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.918609 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.925395 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.925467 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.929611 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.937293 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.937588 kernel: Failed to create system directory sunrpc Feb 9 19:42:21.479000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:21.954466 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:42:21.954587 kernel: RPC: Registered udp transport module. Feb 9 19:42:21.954621 kernel: RPC: Registered tcp transport module. Feb 9 19:42:21.960023 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:42:21.479000 audit[3375]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5568434eead0 a1=1588c4 a2=5568413c22b0 a3=5 items=6 ppid=9 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:21.479000 audit: CWD cwd="/" Feb 9 19:42:21.479000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PATH item=1 name=(null) inode=26404 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PATH item=2 name=(null) inode=26404 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PATH item=3 name=(null) inode=26405 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PATH item=4 name=(null) inode=26404 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PATH item=5 name=(null) inode=26406 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:42:21.479000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.099935 kernel: Failed to create system directory nfs Feb 9 19:42:22.100025 kernel: Failed to create system directory nfs Feb 9 19:42:22.100053 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.104815 kernel: Failed to create system directory nfs Feb 9 19:42:22.104891 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.107445 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.112316 kernel: Failed to create system directory nfs Feb 9 19:42:22.112368 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.117030 kernel: Failed to create system directory nfs Feb 9 19:42:22.117082 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.122151 kernel: Failed to create system directory nfs Feb 9 19:42:22.122192 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.127016 kernel: Failed to create system directory nfs Feb 9 19:42:22.127060 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.131974 kernel: Failed to create system directory nfs Feb 9 19:42:22.132054 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.136707 kernel: Failed to create system directory nfs Feb 9 19:42:22.136773 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.141577 kernel: Failed to create system directory nfs Feb 9 19:42:22.141635 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.146250 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.151327 kernel: Failed to create system directory nfs Feb 9 19:42:22.151405 kernel: Failed to create system directory nfs Feb 9 19:42:22.151432 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.156275 kernel: Failed to create system directory nfs Feb 9 19:42:22.156350 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.161111 kernel: Failed to create system directory nfs Feb 9 19:42:22.161156 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.165917 kernel: Failed to create system directory nfs Feb 9 19:42:22.165961 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.174343 kernel: Failed to create system directory nfs Feb 9 19:42:22.174416 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.179281 kernel: Failed to create system directory nfs Feb 9 19:42:22.179328 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.181694 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.184068 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.186482 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.188774 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.191107 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.195778 kernel: Failed to create system directory nfs Feb 9 19:42:22.195843 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.201567 kernel: Failed to create system directory nfs Feb 9 19:42:22.202536 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.206451 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.211973 kernel: Failed to create system directory nfs Feb 9 19:42:22.212024 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.217045 kernel: Failed to create system directory nfs Feb 9 19:42:22.217129 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.221926 kernel: Failed to create system directory nfs Feb 9 19:42:22.222003 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.226718 kernel: Failed to create system directory nfs Feb 9 19:42:22.226761 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.231344 kernel: Failed to create system directory nfs Feb 9 19:42:22.231417 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.235386 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.240439 kernel: Failed to create system directory nfs Feb 9 19:42:22.240482 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.247754 kernel: Failed to create system directory nfs Feb 9 19:42:22.247828 kernel: Failed to create system directory nfs Feb 9 19:42:22.086000 audit[3375]: AVC avc: denied { confidentiality } for pid=3375 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.265511 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:42:22.086000 audit[3375]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556843691680 a1=e29dc a2=5568413c22b0 a3=5 items=0 ppid=9 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:22.086000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.340087 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.340172 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.340208 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.343439 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.347884 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.347956 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.350436 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.355544 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.355596 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.360650 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.360700 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.365783 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.365830 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.370831 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.370881 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.374776 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.381860 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.381980 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.384894 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.389874 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.389918 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.392763 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.397553 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.397632 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.402521 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.402573 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.407597 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.407746 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.412553 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.412615 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.416829 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.426795 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.426916 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.433588 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.433674 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.438653 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.439433 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.442422 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.447722 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.447796 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.454536 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.454624 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.461093 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.461167 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.467561 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.467629 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.474742 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.474851 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.479756 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.479821 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.484782 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.484833 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.489347 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.490093 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.495702 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.495760 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.503168 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.503225 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.509930 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.509975 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.517245 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.517302 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.524364 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.524928 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.531358 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.531437 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.538108 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.538155 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.543429 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.550335 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.550411 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.550435 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.555198 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.555243 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.559934 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.559973 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.564899 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.564948 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.569584 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.569633 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.574399 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.574438 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.579367 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.579444 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.583554 kubelet[1895]: E0209 19:42:22.583500 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:22.584104 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.584146 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.589233 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.589284 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.594226 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.594274 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.597416 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.602059 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.602123 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.320000 audit[3380]: AVC avc: denied { confidentiality } for pid=3380 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.606509 kernel: Failed to create system directory nfs4 Feb 9 19:42:22.750101 kernel: NFS: Registering the id_resolver key type Feb 9 19:42:22.750260 kernel: Key type id_resolver registered Feb 9 19:42:22.750291 kernel: Key type id_legacy registered Feb 9 19:42:22.320000 audit[3380]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f664f823010 a1=1d3cc4 a2=55b8d3aa92b0 a3=5 items=0 ppid=9 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:22.320000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.777976 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.778041 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.778066 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.783195 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.783254 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.792613 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.792684 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.797794 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.798453 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.803599 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.803667 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.808769 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.808823 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.814097 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.814160 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.819402 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.819452 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.824444 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.824484 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.830467 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.830517 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.834628 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.834695 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.839454 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.839518 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.769000 audit[3382]: AVC avc: denied { confidentiality } for pid=3382 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:42:22.844337 kernel: Failed to create system directory rpcgss Feb 9 19:42:22.769000 audit[3382]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7febf1e4c010 a1=4f524 a2=55f3880832b0 a3=5 items=0 ppid=9 pid=3382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:22.769000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:42:22.988417 nfsidmap[3391]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-7a940f9dc1' Feb 9 19:42:22.994946 nfsidmap[3392]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-7a940f9dc1' Feb 9 19:42:23.012000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1412]: AVC avc: denied { watch_reads } for pid=1412 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560e31a78d60 a2=10 a3=37b22f099a834121 items=0 ppid=1 pid=1412 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.012000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:42:23.012000 audit[1412]: AVC avc: denied { watch_reads } for pid=1412 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560e31a78d60 a2=10 a3=37b22f099a834121 items=0 ppid=1 pid=1412 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.012000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:42:23.012000 audit[1412]: AVC avc: denied { watch_reads } for pid=1412 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2757 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:42:23.012000 audit[1412]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=560e31a78d60 a2=10 a3=37b22f099a834121 items=0 ppid=1 pid=1412 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.012000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:42:23.285086 env[1310]: time="2024-02-09T19:42:23.284950793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1,Namespace:default,Attempt:0,}" Feb 9 19:42:23.422977 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:42:23.423097 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:42:23.415873 systemd-networkd[1457]: cali5ec59c6bf6e: Link UP Feb 9 19:42:23.424748 systemd-networkd[1457]: cali5ec59c6bf6e: Gained carrier Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.344 [INFO][3394] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.15-k8s-test--pod--1-eth0 default fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1 1493 0 2024-02-09 19:41:50 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.15 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.344 [INFO][3394] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.372 [INFO][3406] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" HandleID="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Workload="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.382 [INFO][3406] ipam_plugin.go 268: Auto assigning IP ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" HandleID="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Workload="10.200.8.15-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0000c2a60), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.15", "pod":"test-pod-1", "timestamp":"2024-02-09 19:42:23.372431209 +0000 UTC"}, Hostname:"10.200.8.15", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.382 [INFO][3406] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.383 [INFO][3406] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.383 [INFO][3406] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.15' Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.384 [INFO][3406] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.393 [INFO][3406] ipam.go 372: Looking up existing affinities for host host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.397 [INFO][3406] ipam.go 489: Trying affinity for 192.168.44.64/26 host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.399 [INFO][3406] ipam.go 155: Attempting to load block cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.401 [INFO][3406] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.44.64/26 host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.402 [INFO][3406] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.44.64/26 handle="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.403 [INFO][3406] ipam.go 1682: Creating new handle: k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.407 [INFO][3406] ipam.go 1203: Writing block in order to claim IPs block=192.168.44.64/26 handle="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.411 [INFO][3406] ipam.go 1216: Successfully claimed IPs: [192.168.44.68/26] block=192.168.44.64/26 handle="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.411 [INFO][3406] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.44.68/26] handle="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" host="10.200.8.15" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.411 [INFO][3406] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.411 [INFO][3406] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.44.68/26] IPv6=[] ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" HandleID="k8s-pod-network.93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Workload="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.412 [INFO][3394] k8s.go 385: Populated endpoint ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1", ResourceVersion:"1493", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:23.436963 env[1310]: 2024-02-09 19:42:23.412 [INFO][3394] k8s.go 386: Calico CNI using IPs: [192.168.44.68/32] ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.438047 env[1310]: 2024-02-09 19:42:23.412 [INFO][3394] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.438047 env[1310]: 2024-02-09 19:42:23.415 [INFO][3394] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.438047 env[1310]: 2024-02-09 19:42:23.425 [INFO][3394] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.15-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1", ResourceVersion:"1493", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 41, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.15", ContainerID:"93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.44.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"62:f3:c8:4c:86:f1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:42:23.438047 env[1310]: 2024-02-09 19:42:23.435 [INFO][3394] k8s.go 491: Wrote updated endpoint to datastore ContainerID="93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.15-k8s-test--pod--1-eth0" Feb 9 19:42:23.458493 env[1310]: time="2024-02-09T19:42:23.458424097Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:42:23.458734 env[1310]: time="2024-02-09T19:42:23.458705102Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:42:23.458843 env[1310]: time="2024-02-09T19:42:23.458819304Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:42:23.459076 env[1310]: time="2024-02-09T19:42:23.459046008Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e pid=3436 runtime=io.containerd.runc.v2 Feb 9 19:42:23.470000 audit[3427]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3427 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:42:23.470000 audit[3427]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffeda10b960 a2=0 a3=7ffeda10b94c items=0 ppid=2569 pid=3427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.470000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:42:23.485476 systemd[1]: Started cri-containerd-93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e.scope. Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.501000 audit: BPF prog-id=112 op=LOAD Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3436 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303132616661656133373637643531633661663666336231333666 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3436 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303132616661656133373637643531633661663666336231333666 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit: BPF prog-id=113 op=LOAD Feb 9 19:42:23.502000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a79b0 items=0 ppid=3436 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303132616661656133373637643531633661663666336231333666 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit: BPF prog-id=114 op=LOAD Feb 9 19:42:23.502000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a79f8 items=0 ppid=3436 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303132616661656133373637643531633661663666336231333666 Feb 9 19:42:23.502000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:42:23.502000 audit: BPF prog-id=113 op=UNLOAD Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { perfmon } for pid=3446 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit[3446]: AVC avc: denied { bpf } for pid=3446 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:23.502000 audit: BPF prog-id=115 op=LOAD Feb 9 19:42:23.502000 audit[3446]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7e08 items=0 ppid=3436 pid=3446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933303132616661656133373637643531633661663666336231333666 Feb 9 19:42:23.532237 env[1310]: time="2024-02-09T19:42:23.532180758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:fe48e63c-baf0-4a3b-a4ff-8b38d4b747e1,Namespace:default,Attempt:0,} returns sandbox id \"93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e\"" Feb 9 19:42:23.533732 env[1310]: time="2024-02-09T19:42:23.533698687Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:42:23.584337 kubelet[1895]: E0209 19:42:23.584197 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:24.068112 env[1310]: time="2024-02-09T19:42:24.068057544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:24.076641 env[1310]: time="2024-02-09T19:42:24.076594001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:24.080341 env[1310]: time="2024-02-09T19:42:24.080293169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:24.084989 env[1310]: time="2024-02-09T19:42:24.084948054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:42:24.085500 env[1310]: time="2024-02-09T19:42:24.085469164Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 9 19:42:24.087367 env[1310]: time="2024-02-09T19:42:24.087335698Z" level=info msg="CreateContainer within sandbox \"93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:42:24.114875 env[1310]: time="2024-02-09T19:42:24.114829402Z" level=info msg="CreateContainer within sandbox \"93012afaea3767d51c6af6f3b136f4fbefb5525e3629626665d073a603ce112e\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"821ff22fda3555f20c4725f033dcd038dd0ca267af99ededb335a7d8174deda5\"" Feb 9 19:42:24.115645 env[1310]: time="2024-02-09T19:42:24.115564815Z" level=info msg="StartContainer for \"821ff22fda3555f20c4725f033dcd038dd0ca267af99ededb335a7d8174deda5\"" Feb 9 19:42:24.140838 systemd[1]: Started cri-containerd-821ff22fda3555f20c4725f033dcd038dd0ca267af99ededb335a7d8174deda5.scope. Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit: BPF prog-id=116 op=LOAD Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3436 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316666323266646133353535663230633437323566303333646364 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3436 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316666323266646133353535663230633437323566303333646364 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.158000 audit: BPF prog-id=117 op=LOAD Feb 9 19:42:24.158000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028b6e0 items=0 ppid=3436 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316666323266646133353535663230633437323566303333646364 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit: BPF prog-id=118 op=LOAD Feb 9 19:42:24.159000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028b728 items=0 ppid=3436 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316666323266646133353535663230633437323566303333646364 Feb 9 19:42:24.159000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:42:24.159000 audit: BPF prog-id=117 op=UNLOAD Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { perfmon } for pid=3480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit[3480]: AVC avc: denied { bpf } for pid=3480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:42:24.159000 audit: BPF prog-id=119 op=LOAD Feb 9 19:42:24.159000 audit[3480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028bb38 items=0 ppid=3436 pid=3480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:42:24.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832316666323266646133353535663230633437323566303333646364 Feb 9 19:42:24.177582 env[1310]: time="2024-02-09T19:42:24.177526851Z" level=info msg="StartContainer for \"821ff22fda3555f20c4725f033dcd038dd0ca267af99ededb335a7d8174deda5\" returns successfully" Feb 9 19:42:24.585229 kubelet[1895]: E0209 19:42:24.585185 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:24.844309 kubelet[1895]: I0209 19:42:24.844186 1895 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=34.291662782 podCreationTimestamp="2024-02-09 19:41:50 +0000 UTC" firstStartedPulling="2024-02-09 19:42:23.53335798 +0000 UTC m=+88.409942403" lastFinishedPulling="2024-02-09 19:42:24.085849571 +0000 UTC m=+88.962433994" observedRunningTime="2024-02-09 19:42:24.843870968 +0000 UTC m=+89.720455491" watchObservedRunningTime="2024-02-09 19:42:24.844154373 +0000 UTC m=+89.720738796" Feb 9 19:42:25.001936 systemd[1]: run-containerd-runc-k8s.io-821ff22fda3555f20c4725f033dcd038dd0ca267af99ededb335a7d8174deda5-runc.lpJV0z.mount: Deactivated successfully. Feb 9 19:42:25.185786 systemd-networkd[1457]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:42:25.585573 kubelet[1895]: E0209 19:42:25.585433 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:26.586267 kubelet[1895]: E0209 19:42:26.586203 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:27.587253 kubelet[1895]: E0209 19:42:27.587200 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:27.696035 systemd[1]: run-containerd-runc-k8s.io-69ece0d4bed6370e530b5987fc8924a292a74a6bf251ce7b8988f2a49f0e051a-runc.LdRXl6.mount: Deactivated successfully. Feb 9 19:42:28.588278 kubelet[1895]: E0209 19:42:28.588216 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:29.588963 kubelet[1895]: E0209 19:42:29.588907 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:30.589288 kubelet[1895]: E0209 19:42:30.589236 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:31.590044 kubelet[1895]: E0209 19:42:31.589989 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:32.590907 kubelet[1895]: E0209 19:42:32.590842 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:42:33.591766 kubelet[1895]: E0209 19:42:33.591711 1895 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests"