Feb 12 19:45:30.052694 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Feb 12 18:05:31 -00 2024 Feb 12 19:45:30.052719 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:45:30.052729 kernel: BIOS-provided physical RAM map: Feb 12 19:45:30.052735 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Feb 12 19:45:30.052742 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Feb 12 19:45:30.052749 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Feb 12 19:45:30.052758 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Feb 12 19:45:30.052766 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Feb 12 19:45:30.052773 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Feb 12 19:45:30.052779 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Feb 12 19:45:30.052786 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Feb 12 19:45:30.052794 kernel: printk: bootconsole [earlyser0] enabled Feb 12 19:45:30.052801 kernel: NX (Execute Disable) protection: active Feb 12 19:45:30.052809 kernel: efi: EFI v2.70 by Microsoft Feb 12 19:45:30.052821 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Feb 12 19:45:30.052829 kernel: random: crng init done Feb 12 19:45:30.052837 kernel: SMBIOS 3.1.0 present. Feb 12 19:45:30.052845 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:45:30.052852 kernel: Hypervisor detected: Microsoft Hyper-V Feb 12 19:45:30.052861 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Feb 12 19:45:30.052867 kernel: Hyper-V Host Build:20348-10.0-1-0.1544 Feb 12 19:45:30.052874 kernel: Hyper-V: Nested features: 0x1e0101 Feb 12 19:45:30.052885 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Feb 12 19:45:30.052891 kernel: Hyper-V: Using hypercall for remote TLB flush Feb 12 19:45:30.052898 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Feb 12 19:45:30.052904 kernel: tsc: Marking TSC unstable due to running on Hyper-V Feb 12 19:45:30.052911 kernel: tsc: Detected 2593.906 MHz processor Feb 12 19:45:30.052917 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:45:30.052924 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:45:30.052930 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Feb 12 19:45:30.052940 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:45:30.052947 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Feb 12 19:45:30.052956 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Feb 12 19:45:30.052964 kernel: Using GB pages for direct mapping Feb 12 19:45:30.052971 kernel: Secure boot disabled Feb 12 19:45:30.052979 kernel: ACPI: Early table checksum verification disabled Feb 12 19:45:30.052987 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Feb 12 19:45:30.052993 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053001 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053009 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:45:30.053021 kernel: ACPI: FACS 0x000000003FFFE000 000040 Feb 12 19:45:30.053031 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053037 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053045 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053054 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053061 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053072 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053081 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:45:30.053087 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Feb 12 19:45:30.053095 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Feb 12 19:45:30.053104 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Feb 12 19:45:30.053111 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Feb 12 19:45:30.053119 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Feb 12 19:45:30.053128 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Feb 12 19:45:30.053137 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Feb 12 19:45:30.053146 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Feb 12 19:45:30.053154 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Feb 12 19:45:30.053161 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Feb 12 19:45:30.053171 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:45:30.053178 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:45:30.053185 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Feb 12 19:45:30.053195 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Feb 12 19:45:30.053202 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Feb 12 19:45:30.053213 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Feb 12 19:45:30.053221 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Feb 12 19:45:30.053227 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Feb 12 19:45:30.053238 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Feb 12 19:45:30.053246 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Feb 12 19:45:30.053255 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Feb 12 19:45:30.053264 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Feb 12 19:45:30.053272 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Feb 12 19:45:30.053282 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Feb 12 19:45:30.053293 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Feb 12 19:45:30.053302 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Feb 12 19:45:30.053310 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Feb 12 19:45:30.053317 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Feb 12 19:45:30.053326 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Feb 12 19:45:30.053334 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Feb 12 19:45:30.053341 kernel: Zone ranges: Feb 12 19:45:30.053351 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:45:30.053359 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Feb 12 19:45:30.053371 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:45:30.053382 kernel: Movable zone start for each node Feb 12 19:45:30.053390 kernel: Early memory node ranges Feb 12 19:45:30.053400 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Feb 12 19:45:30.053410 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Feb 12 19:45:30.053419 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Feb 12 19:45:30.053429 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Feb 12 19:45:30.053438 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Feb 12 19:45:30.053446 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:45:30.053457 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Feb 12 19:45:30.053467 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Feb 12 19:45:30.053475 kernel: ACPI: PM-Timer IO Port: 0x408 Feb 12 19:45:30.055508 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Feb 12 19:45:30.055519 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:45:30.055529 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:45:30.055537 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:45:30.055544 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Feb 12 19:45:30.055554 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:45:30.055566 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Feb 12 19:45:30.055574 kernel: Booting paravirtualized kernel on Hyper-V Feb 12 19:45:30.055582 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:45:30.055591 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:45:30.055600 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:45:30.055608 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:45:30.055615 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:45:30.055626 kernel: Hyper-V: PV spinlocks enabled Feb 12 19:45:30.055633 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Feb 12 19:45:30.055644 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Feb 12 19:45:30.055651 kernel: Policy zone: Normal Feb 12 19:45:30.055662 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:45:30.055672 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:45:30.055680 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Feb 12 19:45:30.055687 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:45:30.055697 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:45:30.055705 kernel: Memory: 8081200K/8387460K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 306000K reserved, 0K cma-reserved) Feb 12 19:45:30.055717 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:45:30.055724 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:45:30.055741 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:45:30.055753 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:45:30.055761 kernel: rcu: RCU event tracing is enabled. Feb 12 19:45:30.055771 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:45:30.055780 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:45:30.055791 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:45:30.055799 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:45:30.055807 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:45:30.055817 kernel: Using NULL legacy PIC Feb 12 19:45:30.055829 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Feb 12 19:45:30.055836 kernel: Console: colour dummy device 80x25 Feb 12 19:45:30.055845 kernel: printk: console [tty1] enabled Feb 12 19:45:30.055854 kernel: printk: console [ttyS0] enabled Feb 12 19:45:30.055864 kernel: printk: bootconsole [earlyser0] disabled Feb 12 19:45:30.055874 kernel: ACPI: Core revision 20210730 Feb 12 19:45:30.055883 kernel: Failed to register legacy timer interrupt Feb 12 19:45:30.055892 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:45:30.055902 kernel: Hyper-V: Using IPI hypercalls Feb 12 19:45:30.055910 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Feb 12 19:45:30.055918 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Feb 12 19:45:30.055928 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Feb 12 19:45:30.055939 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:45:30.055946 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:45:30.055954 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:45:30.055966 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:45:30.055976 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Feb 12 19:45:30.055984 kernel: RETBleed: Vulnerable Feb 12 19:45:30.055993 kernel: Speculative Store Bypass: Vulnerable Feb 12 19:45:30.056001 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:45:30.056012 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:45:30.056019 kernel: GDS: Unknown: Dependent on hypervisor status Feb 12 19:45:30.056027 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:45:30.056036 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:45:30.056046 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:45:30.056056 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Feb 12 19:45:30.056064 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Feb 12 19:45:30.056073 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Feb 12 19:45:30.056084 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:45:30.056091 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Feb 12 19:45:30.056099 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Feb 12 19:45:30.056108 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Feb 12 19:45:30.056118 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Feb 12 19:45:30.056126 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:45:30.056134 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:45:30.056144 kernel: LSM: Security Framework initializing Feb 12 19:45:30.056153 kernel: SELinux: Initializing. Feb 12 19:45:30.056163 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:45:30.056172 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:45:30.056181 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Feb 12 19:45:30.056190 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Feb 12 19:45:30.056199 kernel: signal: max sigframe size: 3632 Feb 12 19:45:30.056206 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:45:30.056217 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:45:30.056225 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:45:30.056234 kernel: x86: Booting SMP configuration: Feb 12 19:45:30.056241 kernel: .... node #0, CPUs: #1 Feb 12 19:45:30.056254 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Feb 12 19:45:30.056264 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Feb 12 19:45:30.056272 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:45:30.056280 kernel: smpboot: Max logical packages: 1 Feb 12 19:45:30.056290 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Feb 12 19:45:30.056299 kernel: devtmpfs: initialized Feb 12 19:45:30.056307 kernel: x86/mm: Memory block size: 128MB Feb 12 19:45:30.056315 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Feb 12 19:45:30.056327 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:45:30.056338 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:45:30.056346 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:45:30.056354 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:45:30.056363 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:45:30.056373 kernel: audit: type=2000 audit(1707767129.023:1): state=initialized audit_enabled=0 res=1 Feb 12 19:45:30.056381 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:45:30.056389 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:45:30.056399 kernel: cpuidle: using governor menu Feb 12 19:45:30.056412 kernel: ACPI: bus type PCI registered Feb 12 19:45:30.056419 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:45:30.056428 kernel: dca service started, version 1.12.1 Feb 12 19:45:30.056438 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:45:30.056449 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:45:30.056456 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:45:30.056465 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:45:30.056474 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:45:30.056490 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:45:30.056500 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:45:30.056510 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:45:30.056518 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:45:30.056528 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:45:30.056535 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:45:30.056545 kernel: ACPI: Interpreter enabled Feb 12 19:45:30.056554 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:45:30.056564 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:45:30.056571 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:45:30.056584 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Feb 12 19:45:30.056592 kernel: iommu: Default domain type: Translated Feb 12 19:45:30.056602 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:45:30.056609 kernel: vgaarb: loaded Feb 12 19:45:30.056619 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:45:30.056628 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:45:30.056637 kernel: PTP clock support registered Feb 12 19:45:30.056645 kernel: Registered efivars operations Feb 12 19:45:30.056655 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:45:30.056663 kernel: PCI: System does not support PCI Feb 12 19:45:30.056674 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Feb 12 19:45:30.056682 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:45:30.056692 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:45:30.056701 kernel: pnp: PnP ACPI init Feb 12 19:45:30.056710 kernel: pnp: PnP ACPI: found 3 devices Feb 12 19:45:30.056717 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:45:30.056728 kernel: NET: Registered PF_INET protocol family Feb 12 19:45:30.056736 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:45:30.056747 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Feb 12 19:45:30.056755 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:45:30.056765 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:45:30.056775 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Feb 12 19:45:30.056783 kernel: TCP: Hash tables configured (established 65536 bind 65536) Feb 12 19:45:30.056791 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:45:30.056801 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Feb 12 19:45:30.056810 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:45:30.056819 kernel: NET: Registered PF_XDP protocol family Feb 12 19:45:30.056828 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:45:30.056835 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Feb 12 19:45:30.056842 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Feb 12 19:45:30.056850 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:45:30.056857 kernel: Initialise system trusted keyrings Feb 12 19:45:30.056864 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Feb 12 19:45:30.056871 kernel: Key type asymmetric registered Feb 12 19:45:30.056878 kernel: Asymmetric key parser 'x509' registered Feb 12 19:45:30.056885 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:45:30.056894 kernel: io scheduler mq-deadline registered Feb 12 19:45:30.056901 kernel: io scheduler kyber registered Feb 12 19:45:30.056912 kernel: io scheduler bfq registered Feb 12 19:45:30.056920 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:45:30.056927 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:45:30.056937 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:45:30.056945 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Feb 12 19:45:30.056952 kernel: i8042: PNP: No PS/2 controller found. Feb 12 19:45:30.057093 kernel: rtc_cmos 00:02: registered as rtc0 Feb 12 19:45:30.057182 kernel: rtc_cmos 00:02: setting system clock to 2024-02-12T19:45:29 UTC (1707767129) Feb 12 19:45:30.057265 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Feb 12 19:45:30.057275 kernel: fail to initialize ptp_kvm Feb 12 19:45:30.057283 kernel: intel_pstate: CPU model not supported Feb 12 19:45:30.057293 kernel: efifb: probing for efifb Feb 12 19:45:30.057301 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:45:30.057308 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:45:30.057319 kernel: efifb: scrolling: redraw Feb 12 19:45:30.057332 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:45:30.057340 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:45:30.057348 kernel: fb0: EFI VGA frame buffer device Feb 12 19:45:30.057358 kernel: pstore: Registered efi as persistent store backend Feb 12 19:45:30.057368 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:45:30.057376 kernel: Segment Routing with IPv6 Feb 12 19:45:30.057384 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:45:30.057394 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:45:30.057404 kernel: Key type dns_resolver registered Feb 12 19:45:30.057414 kernel: IPI shorthand broadcast: enabled Feb 12 19:45:30.057423 kernel: sched_clock: Marking stable (775700200, 21812700)->(976394700, -178881800) Feb 12 19:45:30.057432 kernel: registered taskstats version 1 Feb 12 19:45:30.057443 kernel: Loading compiled-in X.509 certificates Feb 12 19:45:30.057450 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 253e5c5c936b12e2ff2626e7f3214deb753330c8' Feb 12 19:45:30.057459 kernel: Key type .fscrypt registered Feb 12 19:45:30.057468 kernel: Key type fscrypt-provisioning registered Feb 12 19:45:30.057485 kernel: pstore: Using crash dump compression: deflate Feb 12 19:45:30.057496 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:45:30.057505 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:45:30.057515 kernel: ima: No architecture policies found Feb 12 19:45:30.057523 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:45:30.057531 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:45:30.057542 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:45:30.057552 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:45:30.057560 kernel: Run /init as init process Feb 12 19:45:30.057568 kernel: with arguments: Feb 12 19:45:30.057578 kernel: /init Feb 12 19:45:30.057590 kernel: with environment: Feb 12 19:45:30.057597 kernel: HOME=/ Feb 12 19:45:30.057605 kernel: TERM=linux Feb 12 19:45:30.057615 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:45:30.057626 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:45:30.057636 systemd[1]: Detected virtualization microsoft. Feb 12 19:45:30.057648 systemd[1]: Detected architecture x86-64. Feb 12 19:45:30.057659 systemd[1]: Running in initrd. Feb 12 19:45:30.057668 systemd[1]: No hostname configured, using default hostname. Feb 12 19:45:30.057676 systemd[1]: Hostname set to . Feb 12 19:45:30.057687 systemd[1]: Initializing machine ID from random generator. Feb 12 19:45:30.057697 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:45:30.057705 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:45:30.057713 systemd[1]: Reached target cryptsetup.target. Feb 12 19:45:30.057723 systemd[1]: Reached target paths.target. Feb 12 19:45:30.057734 systemd[1]: Reached target slices.target. Feb 12 19:45:30.057744 systemd[1]: Reached target swap.target. Feb 12 19:45:30.057754 systemd[1]: Reached target timers.target. Feb 12 19:45:30.057763 systemd[1]: Listening on iscsid.socket. Feb 12 19:45:30.057774 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:45:30.057781 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:45:30.057793 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:45:30.057801 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:45:30.057813 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:45:30.057821 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:45:30.057832 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:45:30.057842 systemd[1]: Reached target sockets.target. Feb 12 19:45:30.057851 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:45:30.057860 systemd[1]: Finished network-cleanup.service. Feb 12 19:45:30.057870 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:45:30.057880 systemd[1]: Starting systemd-journald.service... Feb 12 19:45:30.057889 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:45:30.057900 systemd[1]: Starting systemd-resolved.service... Feb 12 19:45:30.057911 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:45:30.057921 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:45:30.057929 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:45:30.057940 kernel: audit: type=1130 audit(1707767130.053:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.057953 systemd-journald[183]: Journal started Feb 12 19:45:30.057998 systemd-journald[183]: Runtime Journal (/run/log/journal/aec75fff268d497a9e598319c4c94e72) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:45:30.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.033567 systemd-modules-load[184]: Inserted module 'overlay' Feb 12 19:45:30.069686 systemd[1]: Started systemd-journald.service. Feb 12 19:45:30.077281 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:45:30.114679 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:45:30.114710 kernel: audit: type=1130 audit(1707767130.076:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.114728 kernel: audit: type=1130 audit(1707767130.101:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.102701 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:45:30.120901 kernel: Bridge firewalling registered Feb 12 19:45:30.120683 systemd-modules-load[184]: Inserted module 'br_netfilter' Feb 12 19:45:30.126246 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:45:30.140520 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:45:30.144351 systemd-resolved[185]: Positive Trust Anchors: Feb 12 19:45:30.146044 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:45:30.146197 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:45:30.149643 systemd-resolved[185]: Defaulting to hostname 'linux'. Feb 12 19:45:30.186056 kernel: audit: type=1130 audit(1707767130.162:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.163257 systemd[1]: Started systemd-resolved.service. Feb 12 19:45:30.165491 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:45:30.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.167729 systemd[1]: Reached target nss-lookup.target. Feb 12 19:45:30.203902 kernel: audit: type=1130 audit(1707767130.165:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.182544 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:45:30.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.216543 kernel: audit: type=1130 audit(1707767130.167:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.218032 dracut-cmdline[201]: dracut-dracut-053 Feb 12 19:45:30.222401 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=f2beb0668e3dab90bbcf0ace3803b7ee02142bfb86913ef12ef6d2ee81a411a4 Feb 12 19:45:30.239852 kernel: SCSI subsystem initialized Feb 12 19:45:30.265162 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:45:30.265226 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:45:30.270756 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:45:30.274787 systemd-modules-load[184]: Inserted module 'dm_multipath' Feb 12 19:45:30.275681 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:45:30.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.294594 kernel: audit: type=1130 audit(1707767130.281:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.282652 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:45:30.305135 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:45:30.321345 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:45:30.321367 kernel: audit: type=1130 audit(1707767130.310:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.336501 kernel: iscsi: registered transport (tcp) Feb 12 19:45:30.360447 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:45:30.360524 kernel: QLogic iSCSI HBA Driver Feb 12 19:45:30.389617 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:45:30.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.404524 kernel: audit: type=1130 audit(1707767130.391:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.404908 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:45:30.457507 kernel: raid6: avx512x4 gen() 18196 MB/s Feb 12 19:45:30.477495 kernel: raid6: avx512x4 xor() 8340 MB/s Feb 12 19:45:30.497491 kernel: raid6: avx512x2 gen() 18369 MB/s Feb 12 19:45:30.517496 kernel: raid6: avx512x2 xor() 29666 MB/s Feb 12 19:45:30.537491 kernel: raid6: avx512x1 gen() 18467 MB/s Feb 12 19:45:30.557493 kernel: raid6: avx512x1 xor() 26797 MB/s Feb 12 19:45:30.577493 kernel: raid6: avx2x4 gen() 18240 MB/s Feb 12 19:45:30.597491 kernel: raid6: avx2x4 xor() 7958 MB/s Feb 12 19:45:30.617491 kernel: raid6: avx2x2 gen() 18375 MB/s Feb 12 19:45:30.637494 kernel: raid6: avx2x2 xor() 22062 MB/s Feb 12 19:45:30.657488 kernel: raid6: avx2x1 gen() 13929 MB/s Feb 12 19:45:30.677492 kernel: raid6: avx2x1 xor() 19387 MB/s Feb 12 19:45:30.697494 kernel: raid6: sse2x4 gen() 11500 MB/s Feb 12 19:45:30.717491 kernel: raid6: sse2x4 xor() 7370 MB/s Feb 12 19:45:30.737490 kernel: raid6: sse2x2 gen() 12451 MB/s Feb 12 19:45:30.757491 kernel: raid6: sse2x2 xor() 7563 MB/s Feb 12 19:45:30.777490 kernel: raid6: sse2x1 gen() 11516 MB/s Feb 12 19:45:30.800718 kernel: raid6: sse2x1 xor() 5920 MB/s Feb 12 19:45:30.800744 kernel: raid6: using algorithm avx512x1 gen() 18467 MB/s Feb 12 19:45:30.800755 kernel: raid6: .... xor() 26797 MB/s, rmw enabled Feb 12 19:45:30.804634 kernel: raid6: using avx512x2 recovery algorithm Feb 12 19:45:30.822507 kernel: xor: automatically using best checksumming function avx Feb 12 19:45:30.917505 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:45:30.925944 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:45:30.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.929000 audit: BPF prog-id=7 op=LOAD Feb 12 19:45:30.929000 audit: BPF prog-id=8 op=LOAD Feb 12 19:45:30.931018 systemd[1]: Starting systemd-udevd.service... Feb 12 19:45:30.946491 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:45:30.954249 systemd[1]: Started systemd-udevd.service. Feb 12 19:45:30.957614 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:45:30.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:30.978218 dracut-pre-trigger[395]: rd.md=0: removing MD RAID activation Feb 12 19:45:31.009594 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:45:31.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:31.012923 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:45:31.049015 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:45:31.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:31.102508 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:45:31.113612 kernel: hv_vmbus: Vmbus version:5.2 Feb 12 19:45:31.122582 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:45:31.132499 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:45:31.139498 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:45:31.156498 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:45:31.169425 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:45:31.169493 kernel: scsi host1: storvsc_host_t Feb 12 19:45:31.181769 kernel: AES CTR mode by8 optimization enabled Feb 12 19:45:31.181825 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:45:31.181837 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:45:31.189564 kernel: scsi host0: storvsc_host_t Feb 12 19:45:31.201365 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:45:31.201415 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:45:31.201570 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:45:31.212496 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:45:31.237498 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:45:31.237722 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:45:31.237855 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:45:31.248236 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:45:31.248444 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:45:31.253491 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:45:31.253671 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:45:31.256807 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:45:31.262508 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:45:31.266495 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:45:31.304505 kernel: hv_netvsc 000d3ab5-cad4-000d-3ab5-cad4000d3ab5 eth0: VF slot 1 added Feb 12 19:45:31.319418 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:45:31.319464 kernel: hv_pci 68eee0d0-3bb3-4735-a1a0-d2d3b0135afb: PCI VMBus probing: Using version 0x10004 Feb 12 19:45:31.331853 kernel: hv_pci 68eee0d0-3bb3-4735-a1a0-d2d3b0135afb: PCI host bridge to bus 3bb3:00 Feb 12 19:45:31.332062 kernel: pci_bus 3bb3:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Feb 12 19:45:31.332198 kernel: pci_bus 3bb3:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:45:31.345495 kernel: pci 3bb3:00:02.0: [15b3:1016] type 00 class 0x020000 Feb 12 19:45:31.355164 kernel: pci 3bb3:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:45:31.372908 kernel: pci 3bb3:00:02.0: enabling Extended Tags Feb 12 19:45:31.386521 kernel: pci 3bb3:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 3bb3:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Feb 12 19:45:31.395769 kernel: pci_bus 3bb3:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:45:31.395942 kernel: pci 3bb3:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Feb 12 19:45:31.411501 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (440) Feb 12 19:45:31.423578 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:45:31.450269 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:45:31.491628 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:45:31.498938 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:45:31.511713 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:45:31.518121 systemd[1]: Starting disk-uuid.service... Feb 12 19:45:31.538773 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:45:31.543498 kernel: mlx5_core 3bb3:00:02.0: firmware version: 14.30.1350 Feb 12 19:45:31.732500 kernel: mlx5_core 3bb3:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Feb 12 19:45:31.882076 kernel: mlx5_core 3bb3:00:02.0: Supported tc offload range - chains: 1, prios: 1 Feb 12 19:45:31.882322 kernel: mlx5_core 3bb3:00:02.0: mlx5e_tc_post_act_init:40:(pid 188): firmware level support is missing Feb 12 19:45:31.894082 kernel: hv_netvsc 000d3ab5-cad4-000d-3ab5-cad4000d3ab5 eth0: VF registering: eth1 Feb 12 19:45:31.894270 kernel: mlx5_core 3bb3:00:02.0 eth1: joined to eth0 Feb 12 19:45:31.905495 kernel: mlx5_core 3bb3:00:02.0 enP15283s1: renamed from eth1 Feb 12 19:45:32.555509 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:45:32.555727 disk-uuid[549]: The operation has completed successfully. Feb 12 19:45:32.633277 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:45:32.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.633377 systemd[1]: Finished disk-uuid.service. Feb 12 19:45:32.642934 systemd[1]: Starting verity-setup.service... Feb 12 19:45:32.669508 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:45:32.746801 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:45:32.753201 systemd[1]: Finished verity-setup.service. Feb 12 19:45:32.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.757894 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:45:32.833495 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:45:32.834344 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:45:32.838098 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:45:32.842241 systemd[1]: Starting ignition-setup.service... Feb 12 19:45:32.847146 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:45:32.861501 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:45:32.861544 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:45:32.861558 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:45:32.906892 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:45:32.927231 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:45:32.932993 systemd[1]: Starting systemd-networkd.service... Feb 12 19:45:32.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.931000 audit: BPF prog-id=9 op=LOAD Feb 12 19:45:32.956316 systemd-networkd[830]: lo: Link UP Feb 12 19:45:32.956327 systemd-networkd[830]: lo: Gained carrier Feb 12 19:45:32.960277 systemd-networkd[830]: Enumeration completed Feb 12 19:45:32.960383 systemd[1]: Started systemd-networkd.service. Feb 12 19:45:32.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.964918 systemd-networkd[830]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:45:32.966515 systemd[1]: Reached target network.target. Feb 12 19:45:32.977245 systemd[1]: Starting iscsiuio.service... Feb 12 19:45:32.984677 systemd[1]: Finished ignition-setup.service. Feb 12 19:45:32.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.986888 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:45:32.991714 systemd[1]: Started iscsiuio.service. Feb 12 19:45:32.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:32.997719 systemd[1]: Starting iscsid.service... Feb 12 19:45:33.004164 iscsid[837]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:45:33.004164 iscsid[837]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:45:33.004164 iscsid[837]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:45:33.004164 iscsid[837]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:45:33.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:33.028845 iscsid[837]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:45:33.028845 iscsid[837]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:45:33.007738 systemd[1]: Started iscsid.service. Feb 12 19:45:33.023674 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:45:33.046303 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:45:33.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:33.048932 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:45:33.052909 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:45:33.055243 systemd[1]: Reached target remote-fs.target. Feb 12 19:45:33.069539 kernel: mlx5_core 3bb3:00:02.0 enP15283s1: Link up Feb 12 19:45:33.066749 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:45:33.077363 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:45:33.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:33.159047 kernel: hv_netvsc 000d3ab5-cad4-000d-3ab5-cad4000d3ab5 eth0: Data path switched to VF: enP15283s1 Feb 12 19:45:33.159269 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:45:33.163702 systemd-networkd[830]: enP15283s1: Link UP Feb 12 19:45:33.163840 systemd-networkd[830]: eth0: Link UP Feb 12 19:45:33.164032 systemd-networkd[830]: eth0: Gained carrier Feb 12 19:45:33.169047 systemd-networkd[830]: enP15283s1: Gained carrier Feb 12 19:45:33.194574 systemd-networkd[830]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:45:33.931029 ignition[835]: Ignition 2.14.0 Feb 12 19:45:33.931044 ignition[835]: Stage: fetch-offline Feb 12 19:45:33.931124 ignition[835]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:33.931164 ignition[835]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:33.998870 ignition[835]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:33.999051 ignition[835]: parsed url from cmdline: "" Feb 12 19:45:34.000307 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:45:34.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:33.999055 ignition[835]: no config URL provided Feb 12 19:45:34.005431 systemd[1]: Starting ignition-fetch.service... Feb 12 19:45:33.999060 ignition[835]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:45:33.999068 ignition[835]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:45:33.999074 ignition[835]: failed to fetch config: resource requires networking Feb 12 19:45:33.999410 ignition[835]: Ignition finished successfully Feb 12 19:45:34.026208 ignition[858]: Ignition 2.14.0 Feb 12 19:45:34.026218 ignition[858]: Stage: fetch Feb 12 19:45:34.026354 ignition[858]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:34.026387 ignition[858]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:34.035783 ignition[858]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:34.039525 ignition[858]: parsed url from cmdline: "" Feb 12 19:45:34.039535 ignition[858]: no config URL provided Feb 12 19:45:34.039544 ignition[858]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:45:34.039561 ignition[858]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:45:34.039604 ignition[858]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:45:34.066111 ignition[858]: GET result: OK Feb 12 19:45:34.066243 ignition[858]: config has been read from IMDS userdata Feb 12 19:45:34.066273 ignition[858]: parsing config with SHA512: 217aeebb57204a791869e204177fddcff9cb35da7f652a6061aec6db3a1563de99f464f55c9e7d6c38d993edfcfe6838174a58a5310a022d05cead714d096770 Feb 12 19:45:34.083604 unknown[858]: fetched base config from "system" Feb 12 19:45:34.083616 unknown[858]: fetched base config from "system" Feb 12 19:45:34.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.084124 ignition[858]: fetch: fetch complete Feb 12 19:45:34.083624 unknown[858]: fetched user config from "azure" Feb 12 19:45:34.084129 ignition[858]: fetch: fetch passed Feb 12 19:45:34.087732 systemd[1]: Finished ignition-fetch.service. Feb 12 19:45:34.084169 ignition[858]: Ignition finished successfully Feb 12 19:45:34.090989 systemd[1]: Starting ignition-kargs.service... Feb 12 19:45:34.105010 ignition[864]: Ignition 2.14.0 Feb 12 19:45:34.105020 ignition[864]: Stage: kargs Feb 12 19:45:34.105154 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:34.105187 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:34.109997 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:34.111330 ignition[864]: kargs: kargs passed Feb 12 19:45:34.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.112280 systemd[1]: Finished ignition-kargs.service. Feb 12 19:45:34.111373 ignition[864]: Ignition finished successfully Feb 12 19:45:34.118074 systemd[1]: Starting ignition-disks.service... Feb 12 19:45:34.129234 ignition[870]: Ignition 2.14.0 Feb 12 19:45:34.129242 ignition[870]: Stage: disks Feb 12 19:45:34.129374 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:34.129403 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:34.141575 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:34.142782 ignition[870]: disks: disks passed Feb 12 19:45:34.142829 ignition[870]: Ignition finished successfully Feb 12 19:45:34.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.146198 systemd[1]: Finished ignition-disks.service. Feb 12 19:45:34.148471 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:45:34.152443 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:45:34.154706 systemd[1]: Reached target local-fs.target. Feb 12 19:45:34.156737 systemd[1]: Reached target sysinit.target. Feb 12 19:45:34.160660 systemd[1]: Reached target basic.target. Feb 12 19:45:34.163447 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:45:34.192535 systemd-fsck[878]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 12 19:45:34.195715 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:45:34.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.200892 systemd[1]: Mounting sysroot.mount... Feb 12 19:45:34.217520 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:45:34.217650 systemd[1]: Mounted sysroot.mount. Feb 12 19:45:34.221407 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:45:34.237088 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:45:34.241779 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:45:34.246125 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:45:34.246163 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:45:34.255914 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:45:34.268639 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:45:34.273592 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:45:34.286269 initrd-setup-root[893]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:45:34.289104 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (888) Feb 12 19:45:34.298501 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:45:34.298547 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:45:34.298561 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:45:34.303312 initrd-setup-root[914]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:45:34.328758 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:45:34.334724 initrd-setup-root[927]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:45:34.339366 initrd-setup-root[935]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:45:34.403593 systemd-networkd[830]: eth0: Gained IPv6LL Feb 12 19:45:34.478634 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:45:34.486285 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:45:34.486312 kernel: audit: type=1130 audit(1707767134.481:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.487448 systemd[1]: Starting ignition-mount.service... Feb 12 19:45:34.502991 systemd[1]: Starting sysroot-boot.service... Feb 12 19:45:34.507723 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:45:34.507860 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:45:34.527872 ignition[955]: INFO : Ignition 2.14.0 Feb 12 19:45:34.527872 ignition[955]: INFO : Stage: mount Feb 12 19:45:34.527872 ignition[955]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:34.527872 ignition[955]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:34.544653 ignition[955]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:34.547184 systemd[1]: Finished sysroot-boot.service. Feb 12 19:45:34.549811 ignition[955]: INFO : mount: mount passed Feb 12 19:45:34.567715 kernel: audit: type=1130 audit(1707767134.552:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.554237 systemd[1]: Finished ignition-mount.service. Feb 12 19:45:34.571698 ignition[955]: INFO : Ignition finished successfully Feb 12 19:45:34.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.583515 kernel: audit: type=1130 audit(1707767134.571:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.710286 coreos-metadata[887]: Feb 12 19:45:34.710 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:45:34.716935 coreos-metadata[887]: Feb 12 19:45:34.716 INFO Fetch successful Feb 12 19:45:34.751551 coreos-metadata[887]: Feb 12 19:45:34.751 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:45:34.763155 coreos-metadata[887]: Feb 12 19:45:34.763 INFO Fetch successful Feb 12 19:45:34.771325 coreos-metadata[887]: Feb 12 19:45:34.771 INFO wrote hostname ci-3510.3.2-a-4cc8fcdc9a to /sysroot/etc/hostname Feb 12 19:45:34.776849 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:45:34.780173 systemd[1]: Starting ignition-files.service... Feb 12 19:45:34.817171 kernel: audit: type=1130 audit(1707767134.778:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:45:34.797468 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:45:34.829508 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (966) Feb 12 19:45:34.829558 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:45:34.836896 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:45:34.836921 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:45:34.845086 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:45:34.858043 ignition[985]: INFO : Ignition 2.14.0 Feb 12 19:45:34.858043 ignition[985]: INFO : Stage: files Feb 12 19:45:34.861832 ignition[985]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:45:34.861832 ignition[985]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:45:34.875131 ignition[985]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:45:34.880431 ignition[985]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:45:34.887389 ignition[985]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:45:34.890846 ignition[985]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:45:34.900927 ignition[985]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:45:34.904377 ignition[985]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:45:34.908114 unknown[985]: wrote ssh authorized keys file for user: core Feb 12 19:45:34.910485 ignition[985]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:45:34.914024 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:45:34.919086 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:45:35.548603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:45:35.757297 ignition[985]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:45:35.764654 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:45:35.764654 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:45:35.764654 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:45:36.266602 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:45:36.351441 ignition[985]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:45:36.360067 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:45:36.360067 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:45:36.360067 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:45:36.979917 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:46:01.786220 ignition[985]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Feb 12 19:46:01.794184 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:46:01.794184 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:46:01.794184 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:46:02.262436 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:46:53.937137 ignition[985]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3465292356" Feb 12 19:46:53.952295 ignition[985]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3465292356": device or resource busy Feb 12 19:46:53.952295 ignition[985]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3465292356", trying btrfs: device or resource busy Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3465292356" Feb 12 19:46:53.952295 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3465292356" Feb 12 19:46:54.018561 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (985) Feb 12 19:46:54.018603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3465292356" Feb 12 19:46:54.018603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3465292356" Feb 12 19:46:54.018603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:46:54.018603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:46:54.018603 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:46:54.050525 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1100264610" Feb 12 19:46:54.055846 ignition[985]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1100264610": device or resource busy Feb 12 19:46:54.055846 ignition[985]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1100264610", trying btrfs: device or resource busy Feb 12 19:46:54.055846 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1100264610" Feb 12 19:46:54.055846 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1100264610" Feb 12 19:46:54.055846 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1100264610" Feb 12 19:46:54.102768 kernel: audit: type=1130 audit(1707767214.063:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.102897 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1100264610" Feb 12 19:46:54.102897 ignition[985]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(19): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:46:54.102897 ignition[985]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:46:54.253120 kernel: audit: type=1130 audit(1707767214.109:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.253161 kernel: audit: type=1130 audit(1707767214.125:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.253177 kernel: audit: type=1131 audit(1707767214.125:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.253193 kernel: audit: type=1130 audit(1707767214.166:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.253214 kernel: audit: type=1131 audit(1707767214.166:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.060903 systemd[1]: Finished ignition-files.service. Feb 12 19:46:54.258553 ignition[985]: INFO : files: op(1b): [started] setting preset to enabled for "waagent.service" Feb 12 19:46:54.258553 ignition[985]: INFO : files: op(1b): [finished] setting preset to enabled for "waagent.service" Feb 12 19:46:54.258553 ignition[985]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:46:54.258553 ignition[985]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:46:54.258553 ignition[985]: INFO : files: files passed Feb 12 19:46:54.258553 ignition[985]: INFO : Ignition finished successfully Feb 12 19:46:54.081647 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:46:54.280681 initrd-setup-root-after-ignition[1009]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:46:54.086485 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:46:54.093537 systemd[1]: Starting ignition-quench.service... Feb 12 19:46:54.103028 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:46:54.109717 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:46:54.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.109794 systemd[1]: Finished ignition-quench.service. Feb 12 19:46:54.314821 kernel: audit: type=1130 audit(1707767214.297:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.128030 systemd[1]: Reached target ignition-complete.target. Feb 12 19:46:54.128890 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:46:54.162682 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:46:54.162783 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:46:54.166385 systemd[1]: Reached target initrd-fs.target. Feb 12 19:46:54.192215 systemd[1]: Reached target initrd.target. Feb 12 19:46:54.198585 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:46:54.253963 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:46:54.293191 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:46:54.298031 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:46:54.346840 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:46:54.351368 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:46:54.356390 systemd[1]: Stopped target timers.target. Feb 12 19:46:54.360622 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:46:54.363288 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:46:54.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.367624 systemd[1]: Stopped target initrd.target. Feb 12 19:46:54.380494 kernel: audit: type=1131 audit(1707767214.367:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.383941 systemd[1]: Stopped target basic.target. Feb 12 19:46:54.387687 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:46:54.392428 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:46:54.397367 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:46:54.402068 systemd[1]: Stopped target remote-fs.target. Feb 12 19:46:54.406200 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:46:54.410655 systemd[1]: Stopped target sysinit.target. Feb 12 19:46:54.414836 systemd[1]: Stopped target local-fs.target. Feb 12 19:46:54.419009 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:46:54.423249 systemd[1]: Stopped target swap.target. Feb 12 19:46:54.427514 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:46:54.429940 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:46:54.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.434550 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:46:54.448494 kernel: audit: type=1131 audit(1707767214.434:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.452384 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:46:54.455010 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:46:54.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.459345 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:46:54.476142 kernel: audit: type=1131 audit(1707767214.459:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.459464 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:46:54.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.478649 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:46:54.481272 systemd[1]: Stopped ignition-files.service. Feb 12 19:46:54.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.485442 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:46:54.488147 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:46:54.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.500427 iscsid[837]: iscsid shutting down. Feb 12 19:46:54.493792 systemd[1]: Stopping ignition-mount.service... Feb 12 19:46:54.504155 ignition[1023]: INFO : Ignition 2.14.0 Feb 12 19:46:54.504155 ignition[1023]: INFO : Stage: umount Feb 12 19:46:54.504155 ignition[1023]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:46:54.504155 ignition[1023]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:46:54.498896 systemd[1]: Stopping iscsid.service... Feb 12 19:46:54.518276 ignition[1023]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:46:54.518276 ignition[1023]: INFO : umount: umount passed Feb 12 19:46:54.518276 ignition[1023]: INFO : Ignition finished successfully Feb 12 19:46:54.525288 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:46:54.529402 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:46:54.531970 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:46:54.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.536483 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:46:54.538969 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:46:54.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.545016 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:46:54.547134 systemd[1]: Stopped iscsid.service. Feb 12 19:46:54.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.552047 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:46:54.554807 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:46:54.557119 systemd[1]: Stopped ignition-mount.service. Feb 12 19:46:54.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.561645 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:46:54.563927 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:46:54.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.585916 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:46:54.586055 systemd[1]: Stopped ignition-disks.service. Feb 12 19:46:54.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.592740 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:46:54.592801 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:46:54.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.598900 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:46:54.598954 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:46:54.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.603017 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:46:54.603062 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:46:54.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.603153 systemd[1]: Stopped target paths.target. Feb 12 19:46:54.603569 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:46:54.607512 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:46:54.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.611228 systemd[1]: Stopped target slices.target. Feb 12 19:46:54.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.613253 systemd[1]: Stopped target sockets.target. Feb 12 19:46:54.615186 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:46:54.615237 systemd[1]: Closed iscsid.socket. Feb 12 19:46:54.619551 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:46:54.619608 systemd[1]: Stopped ignition-setup.service. Feb 12 19:46:54.624064 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:46:54.624112 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:46:54.628488 systemd[1]: Stopping iscsiuio.service... Feb 12 19:46:54.633196 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:46:54.633291 systemd[1]: Stopped iscsiuio.service. Feb 12 19:46:54.637248 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:46:54.637341 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:46:54.642082 systemd[1]: Stopped target network.target. Feb 12 19:46:54.645186 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:46:54.645229 systemd[1]: Closed iscsiuio.socket. Feb 12 19:46:54.649350 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:46:54.650988 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:46:54.666554 systemd-networkd[830]: eth0: DHCPv6 lease lost Feb 12 19:46:54.667679 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:46:54.667780 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:46:54.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.691000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:46:54.692635 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:46:54.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.692759 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:46:54.699140 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:46:54.699000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:46:54.699184 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:46:54.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.702277 systemd[1]: Stopping network-cleanup.service... Feb 12 19:46:54.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.707852 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:46:54.707906 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:46:54.710074 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:46:54.725000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.710132 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:46:54.714076 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:46:54.714120 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:46:54.738000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.716520 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:46:54.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.719573 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:46:54.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.723936 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:46:54.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.724073 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:46:54.728430 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:46:54.728467 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:46:54.732245 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:46:54.732286 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:46:54.737119 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:46:54.737159 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:46:54.739222 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:46:54.739263 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:46:54.743314 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:46:54.743365 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:46:54.747899 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:46:54.801949 kernel: hv_netvsc 000d3ab5-cad4-000d-3ab5-cad4000d3ab5 eth0: Data path switched from VF: enP15283s1 Feb 12 19:46:54.752004 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:46:54.752078 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:46:54.757683 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:46:54.757727 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:46:54.759898 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:46:54.759946 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:46:54.762753 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:46:54.762847 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:46:54.825214 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:46:54.827554 systemd[1]: Stopped network-cleanup.service. Feb 12 19:46:54.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:54.832147 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:46:54.837368 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:46:54.848597 systemd[1]: Switching root. Feb 12 19:46:54.872087 systemd-journald[183]: Journal stopped Feb 12 19:46:59.894596 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Feb 12 19:46:59.894639 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:46:59.894656 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:46:59.894671 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:46:59.894684 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:46:59.894697 kernel: SELinux: policy capability open_perms=1 Feb 12 19:46:59.894714 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:46:59.894728 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:46:59.894742 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:46:59.894756 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:46:59.894769 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:46:59.894782 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:46:59.894796 systemd[1]: Successfully loaded SELinux policy in 123.854ms. Feb 12 19:46:59.894813 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 11.499ms. Feb 12 19:46:59.894833 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:46:59.894849 systemd[1]: Detected virtualization microsoft. Feb 12 19:46:59.894864 systemd[1]: Detected architecture x86-64. Feb 12 19:46:59.894879 systemd[1]: Detected first boot. Feb 12 19:46:59.894898 systemd[1]: Hostname set to . Feb 12 19:46:59.894913 systemd[1]: Initializing machine ID from random generator. Feb 12 19:46:59.894928 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:46:59.894943 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:46:59.894957 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:46:59.894973 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:46:59.894990 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:46:59.895007 kernel: kauditd_printk_skb: 51 callbacks suppressed Feb 12 19:46:59.895020 kernel: audit: type=1334 audit(1707767219.419:91): prog-id=12 op=LOAD Feb 12 19:46:59.895034 kernel: audit: type=1334 audit(1707767219.419:92): prog-id=3 op=UNLOAD Feb 12 19:46:59.895045 kernel: audit: type=1334 audit(1707767219.424:93): prog-id=13 op=LOAD Feb 12 19:46:59.895057 kernel: audit: type=1334 audit(1707767219.429:94): prog-id=14 op=LOAD Feb 12 19:46:59.895069 kernel: audit: type=1334 audit(1707767219.429:95): prog-id=4 op=UNLOAD Feb 12 19:46:59.895081 kernel: audit: type=1334 audit(1707767219.429:96): prog-id=5 op=UNLOAD Feb 12 19:46:59.895093 kernel: audit: type=1334 audit(1707767219.433:97): prog-id=15 op=LOAD Feb 12 19:46:59.895109 kernel: audit: type=1334 audit(1707767219.433:98): prog-id=12 op=UNLOAD Feb 12 19:46:59.895126 kernel: audit: type=1334 audit(1707767219.438:99): prog-id=16 op=LOAD Feb 12 19:46:59.895138 kernel: audit: type=1334 audit(1707767219.442:100): prog-id=17 op=LOAD Feb 12 19:46:59.895152 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:46:59.895165 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:46:59.895182 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:46:59.895199 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:46:59.895221 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:46:59.895242 systemd[1]: Created slice system-getty.slice. Feb 12 19:46:59.895259 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:46:59.895274 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:46:59.895290 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:46:59.895302 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:46:59.895315 systemd[1]: Created slice user.slice. Feb 12 19:46:59.895328 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:46:59.895340 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:46:59.895351 systemd[1]: Set up automount boot.automount. Feb 12 19:46:59.895366 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:46:59.895379 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:46:59.895388 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:46:59.895401 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:46:59.895412 systemd[1]: Reached target integritysetup.target. Feb 12 19:46:59.895423 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:46:59.895434 systemd[1]: Reached target remote-fs.target. Feb 12 19:46:59.895448 systemd[1]: Reached target slices.target. Feb 12 19:46:59.895460 systemd[1]: Reached target swap.target. Feb 12 19:46:59.895472 systemd[1]: Reached target torcx.target. Feb 12 19:46:59.895497 systemd[1]: Reached target veritysetup.target. Feb 12 19:46:59.895510 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:46:59.895523 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:46:59.895533 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:46:59.895549 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:46:59.895562 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:46:59.895572 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:46:59.895585 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:46:59.895600 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:46:59.895610 systemd[1]: Mounting media.mount... Feb 12 19:46:59.895623 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:59.895638 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:46:59.895648 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:46:59.895661 systemd[1]: Mounting tmp.mount... Feb 12 19:46:59.895673 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:46:59.895683 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:46:59.895696 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:46:59.895708 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:46:59.895718 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:46:59.895730 systemd[1]: Starting modprobe@drm.service... Feb 12 19:46:59.895744 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:46:59.895755 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:46:59.895767 systemd[1]: Starting modprobe@loop.service... Feb 12 19:46:59.895779 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:46:59.895791 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:46:59.895803 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:46:59.895814 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:46:59.895826 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:46:59.895836 kernel: loop: module loaded Feb 12 19:46:59.895850 systemd[1]: Stopped systemd-journald.service. Feb 12 19:46:59.895863 systemd[1]: Starting systemd-journald.service... Feb 12 19:46:59.895872 kernel: fuse: init (API version 7.34) Feb 12 19:46:59.895884 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:46:59.895897 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:46:59.895908 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:46:59.895921 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:46:59.895933 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:46:59.895943 systemd[1]: Stopped verity-setup.service. Feb 12 19:46:59.895958 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:46:59.895971 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:46:59.895981 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:46:59.895993 systemd[1]: Mounted media.mount. Feb 12 19:46:59.896013 systemd-journald[1157]: Journal started Feb 12 19:46:59.896066 systemd-journald[1157]: Runtime Journal (/run/log/journal/9859c923ee4e4dfa80c8ca5e9c5dd20b) is 8.0M, max 159.0M, 151.0M free. Feb 12 19:46:55.592000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:46:55.829000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:46:55.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:46:55.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:46:55.835000 audit: BPF prog-id=10 op=LOAD Feb 12 19:46:55.835000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:46:55.835000 audit: BPF prog-id=11 op=LOAD Feb 12 19:46:55.835000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:46:56.215000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:46:56.215000 audit[1056]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058cc a1=c00002ae58 a2=c000029b00 a3=32 items=0 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:56.215000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:46:56.222000 audit[1056]: AVC avc: denied { associate } for pid=1056 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:46:56.222000 audit[1056]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a5 a2=1ed a3=0 items=2 ppid=1039 pid=1056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:56.222000 audit: CWD cwd="/" Feb 12 19:46:56.222000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:56.222000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:46:56.222000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:46:59.419000 audit: BPF prog-id=12 op=LOAD Feb 12 19:46:59.419000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:46:59.424000 audit: BPF prog-id=13 op=LOAD Feb 12 19:46:59.429000 audit: BPF prog-id=14 op=LOAD Feb 12 19:46:59.429000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:46:59.429000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:46:59.433000 audit: BPF prog-id=15 op=LOAD Feb 12 19:46:59.433000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:46:59.438000 audit: BPF prog-id=16 op=LOAD Feb 12 19:46:59.442000 audit: BPF prog-id=17 op=LOAD Feb 12 19:46:59.442000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:46:59.442000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:46:59.447000 audit: BPF prog-id=18 op=LOAD Feb 12 19:46:59.447000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:46:59.470000 audit: BPF prog-id=19 op=LOAD Feb 12 19:46:59.470000 audit: BPF prog-id=20 op=LOAD Feb 12 19:46:59.470000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:46:59.470000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:46:59.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.482000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:46:59.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.815000 audit: BPF prog-id=21 op=LOAD Feb 12 19:46:59.815000 audit: BPF prog-id=22 op=LOAD Feb 12 19:46:59.815000 audit: BPF prog-id=23 op=LOAD Feb 12 19:46:59.815000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:46:59.815000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:46:59.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.890000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:46:59.890000 audit[1157]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffea7793460 a2=4000 a3=7ffea77934fc items=0 ppid=1 pid=1157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:46:59.890000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:46:56.208564 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:46:59.418036 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:46:56.209302 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:46:59.471330 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:46:56.209320 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:46:56.209355 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:46:56.209365 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:46:56.209403 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:46:56.209414 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:46:56.209623 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:46:56.209671 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:46:56.209685 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:46:56.210389 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:46:56.210420 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:46:56.210437 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:46:56.210450 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:46:56.210467 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:46:59.900096 systemd[1]: Started systemd-journald.service. Feb 12 19:46:56.210488 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:46:58.858080 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:58.858313 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:58.858438 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:58.858617 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:46:58.858667 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:46:58.858719 /usr/lib/systemd/system-generators/torcx-generator[1056]: time="2024-02-12T19:46:58Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:46:59.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.906341 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:46:59.908762 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:46:59.911196 systemd[1]: Mounted tmp.mount. Feb 12 19:46:59.913498 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:46:59.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.915846 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:46:59.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.918120 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:46:59.918321 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:46:59.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.920977 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:46:59.921162 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:46:59.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.923000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.923521 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:46:59.923710 systemd[1]: Finished modprobe@drm.service. Feb 12 19:46:59.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.926003 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:46:59.926215 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:46:59.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.928753 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:46:59.928948 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:46:59.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.931165 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:46:59.931341 systemd[1]: Finished modprobe@loop.service. Feb 12 19:46:59.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.933758 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:46:59.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.936659 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:46:59.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.939625 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:46:59.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.942764 systemd[1]: Reached target network-pre.target. Feb 12 19:46:59.946648 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:46:59.952040 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:46:59.955531 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:46:59.958024 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:46:59.961943 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:46:59.964675 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:46:59.987641 systemd-journald[1157]: Time spent on flushing to /var/log/journal/9859c923ee4e4dfa80c8ca5e9c5dd20b is 54.584ms for 1157 entries. Feb 12 19:46:59.987641 systemd-journald[1157]: System Journal (/var/log/journal/9859c923ee4e4dfa80c8ca5e9c5dd20b) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:47:00.078728 systemd-journald[1157]: Received client request to flush runtime journal. Feb 12 19:47:00.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:46:59.967823 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:46:59.970043 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:46:59.971608 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:46:59.974937 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:47:00.080353 udevadm[1181]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:46:59.980609 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:46:59.982950 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:47:00.001659 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:47:00.003951 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:47:00.033899 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:47:00.049872 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:47:00.053932 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:47:00.079961 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:47:00.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.169263 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:47:00.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.173454 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:47:00.306388 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:47:00.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.593542 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:47:00.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.596000 audit: BPF prog-id=24 op=LOAD Feb 12 19:47:00.596000 audit: BPF prog-id=25 op=LOAD Feb 12 19:47:00.596000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:47:00.596000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:47:00.597540 systemd[1]: Starting systemd-udevd.service... Feb 12 19:47:00.615694 systemd-udevd[1185]: Using default interface naming scheme 'v252'. Feb 12 19:47:00.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.708000 audit: BPF prog-id=26 op=LOAD Feb 12 19:47:00.704995 systemd[1]: Started systemd-udevd.service. Feb 12 19:47:00.710027 systemd[1]: Starting systemd-networkd.service... Feb 12 19:47:00.740000 audit: BPF prog-id=27 op=LOAD Feb 12 19:47:00.741000 audit: BPF prog-id=28 op=LOAD Feb 12 19:47:00.741000 audit: BPF prog-id=29 op=LOAD Feb 12 19:47:00.742565 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:47:00.758833 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:47:00.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:00.789066 systemd[1]: Started systemd-userdbd.service. Feb 12 19:47:00.841503 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:47:00.911082 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:47:00.911179 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:47:00.897000 audit[1206]: AVC avc: denied { confidentiality } for pid=1206 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:47:00.935545 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:47:00.955202 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:47:00.955294 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:47:00.955321 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:47:02.075068 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:47:02.086426 systemd-networkd[1199]: lo: Link UP Feb 12 19:47:02.088066 systemd-networkd[1199]: lo: Gained carrier Feb 12 19:47:02.089250 systemd-networkd[1199]: Enumeration completed Feb 12 19:47:02.089473 systemd[1]: Started systemd-networkd.service. Feb 12 19:47:02.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.096241 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:47:02.099418 systemd-networkd[1199]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:47:02.104013 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:47:00.897000 audit[1206]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5600f5e03610 a1=f884 a2=7f25b5915bc5 a3=5 items=12 ppid=1185 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:00.897000 audit: CWD cwd="/" Feb 12 19:47:00.897000 audit: PATH item=0 name=(null) inode=235 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=1 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=2 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=3 name=(null) inode=15426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=4 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=5 name=(null) inode=15427 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=6 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=7 name=(null) inode=15428 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=8 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=9 name=(null) inode=15429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=10 name=(null) inode=15425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PATH item=11 name=(null) inode=15430 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:47:00.897000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:47:02.120300 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:47:02.120365 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:47:02.128067 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:47:02.140957 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:47:02.181182 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1203) Feb 12 19:47:02.186734 kernel: mlx5_core 3bb3:00:02.0 enP15283s1: Link up Feb 12 19:47:02.229019 kernel: hv_netvsc 000d3ab5-cad4-000d-3ab5-cad4000d3ab5 eth0: Data path switched to VF: enP15283s1 Feb 12 19:47:02.229028 systemd-networkd[1199]: enP15283s1: Link UP Feb 12 19:47:02.229177 systemd-networkd[1199]: eth0: Link UP Feb 12 19:47:02.229183 systemd-networkd[1199]: eth0: Gained carrier Feb 12 19:47:02.242425 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:47:02.242852 systemd-networkd[1199]: enP15283s1: Gained carrier Feb 12 19:47:02.276987 systemd-networkd[1199]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:47:02.288012 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Feb 12 19:47:02.331397 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:47:02.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.335212 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:47:02.441013 lvm[1262]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:02.467164 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:47:02.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.469870 systemd[1]: Reached target cryptsetup.target. Feb 12 19:47:02.473529 systemd[1]: Starting lvm2-activation.service... Feb 12 19:47:02.479834 lvm[1263]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:47:02.504163 systemd[1]: Finished lvm2-activation.service. Feb 12 19:47:02.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.506669 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:47:02.508862 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:47:02.508897 systemd[1]: Reached target local-fs.target. Feb 12 19:47:02.510842 systemd[1]: Reached target machines.target. Feb 12 19:47:02.514315 systemd[1]: Starting ldconfig.service... Feb 12 19:47:02.516469 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:47:02.516575 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:02.517788 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:47:02.521089 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:47:02.525023 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:47:02.527506 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:02.527621 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:47:02.529030 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:47:02.547588 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:47:02.548959 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1265 (bootctl) Feb 12 19:47:02.550430 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:47:02.554218 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:47:02.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:02.557954 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:47:02.582919 systemd-tmpfiles[1268]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:47:02.925765 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:47:02.926354 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:47:02.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.155659 systemd-fsck[1273]: fsck.fat 4.2 (2021-01-31) Feb 12 19:47:03.155659 systemd-fsck[1273]: /dev/sda1: 789 files, 115339/258078 clusters Feb 12 19:47:03.158605 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:47:03.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.163264 systemd[1]: Mounting boot.mount... Feb 12 19:47:03.174771 systemd[1]: Mounted boot.mount. Feb 12 19:47:03.189238 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:47:03.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.283096 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:47:03.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.287153 systemd[1]: Starting audit-rules.service... Feb 12 19:47:03.290651 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:47:03.294460 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:47:03.297000 audit: BPF prog-id=30 op=LOAD Feb 12 19:47:03.299891 systemd[1]: Starting systemd-resolved.service... Feb 12 19:47:03.301000 audit: BPF prog-id=31 op=LOAD Feb 12 19:47:03.303763 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:47:03.307652 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:47:03.318000 audit[1285]: SYSTEM_BOOT pid=1285 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.324439 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:47:03.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.333264 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:47:03.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.335826 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:47:03.359812 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:47:03.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.409037 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:47:03.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:47:03.411705 systemd[1]: Reached target time-set.target. Feb 12 19:47:03.418000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:47:03.418000 audit[1299]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff81f6f100 a2=420 a3=0 items=0 ppid=1279 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:47:03.418000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:47:03.419724 augenrules[1299]: No rules Feb 12 19:47:03.420205 systemd[1]: Finished audit-rules.service. Feb 12 19:47:03.437786 systemd-resolved[1283]: Positive Trust Anchors: Feb 12 19:47:03.437803 systemd-resolved[1283]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:47:03.437842 systemd-resolved[1283]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:47:03.466431 systemd-resolved[1283]: Using system hostname 'ci-3510.3.2-a-4cc8fcdc9a'. Feb 12 19:47:03.468312 systemd[1]: Started systemd-resolved.service. Feb 12 19:47:03.472388 systemd[1]: Reached target network.target. Feb 12 19:47:03.474637 systemd[1]: Reached target nss-lookup.target. Feb 12 19:47:03.488535 systemd-timesyncd[1284]: Contacted time server 89.234.64.77:123 (0.flatcar.pool.ntp.org). Feb 12 19:47:03.488606 systemd-timesyncd[1284]: Initial clock synchronization to Mon 2024-02-12 19:47:03.488767 UTC. Feb 12 19:47:03.838110 systemd-networkd[1199]: eth0: Gained IPv6LL Feb 12 19:47:03.840199 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:47:03.843022 systemd[1]: Reached target network-online.target. Feb 12 19:47:04.751348 ldconfig[1264]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:47:04.762279 systemd[1]: Finished ldconfig.service. Feb 12 19:47:04.765690 systemd[1]: Starting systemd-update-done.service... Feb 12 19:47:04.779029 systemd[1]: Finished systemd-update-done.service. Feb 12 19:47:04.781961 systemd[1]: Reached target sysinit.target. Feb 12 19:47:04.784601 systemd[1]: Started motdgen.path. Feb 12 19:47:04.786625 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:47:04.790001 systemd[1]: Started logrotate.timer. Feb 12 19:47:04.792218 systemd[1]: Started mdadm.timer. Feb 12 19:47:04.794288 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:47:04.796712 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:47:04.796767 systemd[1]: Reached target paths.target. Feb 12 19:47:04.799037 systemd[1]: Reached target timers.target. Feb 12 19:47:04.801631 systemd[1]: Listening on dbus.socket. Feb 12 19:47:04.804493 systemd[1]: Starting docker.socket... Feb 12 19:47:04.813219 systemd[1]: Listening on sshd.socket. Feb 12 19:47:04.815489 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:04.815986 systemd[1]: Listening on docker.socket. Feb 12 19:47:04.818317 systemd[1]: Reached target sockets.target. Feb 12 19:47:04.820504 systemd[1]: Reached target basic.target. Feb 12 19:47:04.822605 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:04.822648 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:47:04.823781 systemd[1]: Starting containerd.service... Feb 12 19:47:04.826873 systemd[1]: Starting dbus.service... Feb 12 19:47:04.829866 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:47:04.833199 systemd[1]: Starting extend-filesystems.service... Feb 12 19:47:04.835593 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:47:04.837020 systemd[1]: Starting motdgen.service... Feb 12 19:47:04.844741 systemd[1]: Started nvidia.service. Feb 12 19:47:04.849777 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:47:04.853750 systemd[1]: Starting prepare-critools.service... Feb 12 19:47:04.857069 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:47:04.860745 systemd[1]: Starting sshd-keygen.service... Feb 12 19:47:04.865844 systemd[1]: Starting systemd-logind.service... Feb 12 19:47:04.867803 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:47:04.867896 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:47:04.868476 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:47:04.869400 systemd[1]: Starting update-engine.service... Feb 12 19:47:04.872497 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:47:04.881312 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:47:04.881535 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:47:04.898913 jq[1328]: true Feb 12 19:47:04.899824 jq[1310]: false Feb 12 19:47:04.906046 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:47:04.906278 systemd[1]: Finished motdgen.service. Feb 12 19:47:04.911432 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:47:04.921060 tar[1330]: ./ Feb 12 19:47:04.921060 tar[1330]: ./loopback Feb 12 19:47:04.911613 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:47:04.925015 tar[1331]: crictl Feb 12 19:47:04.938964 extend-filesystems[1311]: Found sda Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda1 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda2 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda3 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found usr Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda4 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda6 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda7 Feb 12 19:47:04.941671 extend-filesystems[1311]: Found sda9 Feb 12 19:47:04.941671 extend-filesystems[1311]: Checking size of /dev/sda9 Feb 12 19:47:04.946911 dbus-daemon[1309]: [system] SELinux support is enabled Feb 12 19:47:04.966877 jq[1338]: true Feb 12 19:47:04.947077 systemd[1]: Started dbus.service. Feb 12 19:47:04.952226 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:47:04.952248 systemd[1]: Reached target system-config.target. Feb 12 19:47:04.956215 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:47:04.956242 systemd[1]: Reached target user-config.target. Feb 12 19:47:04.990049 extend-filesystems[1311]: Old size kept for /dev/sda9 Feb 12 19:47:04.992627 extend-filesystems[1311]: Found sr0 Feb 12 19:47:05.009428 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:47:05.009644 systemd[1]: Finished extend-filesystems.service. Feb 12 19:47:05.032027 env[1333]: time="2024-02-12T19:47:05.029166617Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:47:05.068255 systemd-logind[1326]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:47:05.070670 systemd-logind[1326]: New seat seat0. Feb 12 19:47:05.078828 systemd[1]: Started systemd-logind.service. Feb 12 19:47:05.100094 tar[1330]: ./bandwidth Feb 12 19:47:05.118358 bash[1370]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:47:05.118121 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:47:05.146724 env[1333]: time="2024-02-12T19:47:05.146661861Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:47:05.150899 env[1333]: time="2024-02-12T19:47:05.150841641Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.153624 env[1333]: time="2024-02-12T19:47:05.153561993Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:05.153743 env[1333]: time="2024-02-12T19:47:05.153726996Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.154110 env[1333]: time="2024-02-12T19:47:05.154084103Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:05.154217 env[1333]: time="2024-02-12T19:47:05.154202205Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.154284 env[1333]: time="2024-02-12T19:47:05.154271106Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:47:05.154337 env[1333]: time="2024-02-12T19:47:05.154325607Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.154471 env[1333]: time="2024-02-12T19:47:05.154456310Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.154804 env[1333]: time="2024-02-12T19:47:05.154782916Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:47:05.155089 env[1333]: time="2024-02-12T19:47:05.155064821Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:47:05.155183 env[1333]: time="2024-02-12T19:47:05.155167623Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:47:05.155327 env[1333]: time="2024-02-12T19:47:05.155286326Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:47:05.155409 env[1333]: time="2024-02-12T19:47:05.155396628Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174053684Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174136086Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174154786Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174210987Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174234588Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174298189Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174317189Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174347090Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174365390Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174383190Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174400791Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174430091Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174592194Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:47:05.176886 env[1333]: time="2024-02-12T19:47:05.174698396Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175107604Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175147505Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175169305Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175229807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175248007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175291908Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175309208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175324408Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175339309Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175355209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175370209Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175391910Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175551613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175571313Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.177905 env[1333]: time="2024-02-12T19:47:05.175588613Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.178368 env[1333]: time="2024-02-12T19:47:05.175605914Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:47:05.178368 env[1333]: time="2024-02-12T19:47:05.175626514Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:47:05.178368 env[1333]: time="2024-02-12T19:47:05.175643114Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:47:05.178368 env[1333]: time="2024-02-12T19:47:05.175666115Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:47:05.178368 env[1333]: time="2024-02-12T19:47:05.175705916Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:47:05.178527 env[1333]: time="2024-02-12T19:47:05.175960221Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:47:05.178527 env[1333]: time="2024-02-12T19:47:05.176050422Z" level=info msg="Connect containerd service" Feb 12 19:47:05.178527 env[1333]: time="2024-02-12T19:47:05.176096023Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:47:05.187939 env[1333]: time="2024-02-12T19:47:05.178799675Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:47:05.187939 env[1333]: time="2024-02-12T19:47:05.179110281Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:47:05.187939 env[1333]: time="2024-02-12T19:47:05.179162382Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:47:05.187939 env[1333]: time="2024-02-12T19:47:05.179215983Z" level=info msg="containerd successfully booted in 0.150923s" Feb 12 19:47:05.187939 env[1333]: time="2024-02-12T19:47:05.183033056Z" level=info msg="Start subscribing containerd event" Feb 12 19:47:05.179304 systemd[1]: Started containerd.service. Feb 12 19:47:05.200468 update_engine[1327]: I0212 19:47:05.199915 1327 main.cc:92] Flatcar Update Engine starting Feb 12 19:47:05.205675 env[1333]: time="2024-02-12T19:47:05.205631387Z" level=info msg="Start recovering state" Feb 12 19:47:05.205924 env[1333]: time="2024-02-12T19:47:05.205905792Z" level=info msg="Start event monitor" Feb 12 19:47:05.206044 env[1333]: time="2024-02-12T19:47:05.206028295Z" level=info msg="Start snapshots syncer" Feb 12 19:47:05.206129 env[1333]: time="2024-02-12T19:47:05.206116596Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:47:05.206202 env[1333]: time="2024-02-12T19:47:05.206190898Z" level=info msg="Start streaming server" Feb 12 19:47:05.212683 tar[1330]: ./ptp Feb 12 19:47:05.216346 systemd[1]: Started update-engine.service. Feb 12 19:47:05.221159 systemd[1]: Started locksmithd.service. Feb 12 19:47:05.225979 update_engine[1327]: I0212 19:47:05.225946 1327 update_check_scheduler.cc:74] Next update check in 6m6s Feb 12 19:47:05.230411 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:47:05.273099 tar[1330]: ./vlan Feb 12 19:47:05.344510 tar[1330]: ./host-device Feb 12 19:47:05.391609 tar[1330]: ./tuning Feb 12 19:47:05.430193 tar[1330]: ./vrf Feb 12 19:47:05.470151 tar[1330]: ./sbr Feb 12 19:47:05.509787 tar[1330]: ./tap Feb 12 19:47:05.555353 tar[1330]: ./dhcp Feb 12 19:47:05.670486 tar[1330]: ./static Feb 12 19:47:05.703412 tar[1330]: ./firewall Feb 12 19:47:05.753419 tar[1330]: ./macvlan Feb 12 19:47:05.798870 tar[1330]: ./dummy Feb 12 19:47:05.845978 tar[1330]: ./bridge Feb 12 19:47:05.894511 tar[1330]: ./ipvlan Feb 12 19:47:05.939389 tar[1330]: ./portmap Feb 12 19:47:05.983082 tar[1330]: ./host-local Feb 12 19:47:06.050402 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:47:06.138328 systemd[1]: Finished prepare-critools.service. Feb 12 19:47:06.488457 locksmithd[1390]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:47:08.388818 sshd_keygen[1347]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:47:08.409256 systemd[1]: Finished sshd-keygen.service. Feb 12 19:47:08.413403 systemd[1]: Starting issuegen.service... Feb 12 19:47:08.416919 systemd[1]: Started waagent.service. Feb 12 19:47:08.423129 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:47:08.423307 systemd[1]: Finished issuegen.service. Feb 12 19:47:08.427161 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:47:08.437263 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:47:08.441439 systemd[1]: Started getty@tty1.service. Feb 12 19:47:08.452220 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:47:08.454839 systemd[1]: Reached target getty.target. Feb 12 19:47:08.456874 systemd[1]: Reached target multi-user.target. Feb 12 19:47:08.460388 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:47:08.471466 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:47:08.471675 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:47:08.474490 systemd[1]: Startup finished in 594ms (firmware) + 8.946s (loader) + 948ms (kernel) + 1min 25.684s (initrd) + 11.950s (userspace) = 1min 48.124s. Feb 12 19:47:08.592227 login[1424]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:47:08.592464 login[1423]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:47:08.609912 systemd[1]: Created slice user-500.slice. Feb 12 19:47:08.611413 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:47:08.616203 systemd-logind[1326]: New session 2 of user core. Feb 12 19:47:08.621208 systemd-logind[1326]: New session 1 of user core. Feb 12 19:47:08.624865 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:47:08.626476 systemd[1]: Starting user@500.service... Feb 12 19:47:08.633667 (systemd)[1427]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:47:08.755428 systemd[1427]: Queued start job for default target default.target. Feb 12 19:47:08.756141 systemd[1427]: Reached target paths.target. Feb 12 19:47:08.756170 systemd[1427]: Reached target sockets.target. Feb 12 19:47:08.756187 systemd[1427]: Reached target timers.target. Feb 12 19:47:08.756201 systemd[1427]: Reached target basic.target. Feb 12 19:47:08.756325 systemd[1]: Started user@500.service. Feb 12 19:47:08.757561 systemd[1]: Started session-1.scope. Feb 12 19:47:08.758283 systemd[1427]: Reached target default.target. Feb 12 19:47:08.758336 systemd[1427]: Startup finished in 118ms. Feb 12 19:47:08.758384 systemd[1]: Started session-2.scope. Feb 12 19:47:11.005443 waagent[1418]: 2024-02-12T19:47:11.005324Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:47:11.019053 waagent[1418]: 2024-02-12T19:47:11.007893Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:47:11.019053 waagent[1418]: 2024-02-12T19:47:11.009065Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:47:11.019053 waagent[1418]: 2024-02-12T19:47:11.010279Z INFO Daemon Daemon Run daemon Feb 12 19:47:11.019053 waagent[1418]: 2024-02-12T19:47:11.011289Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:47:11.024878 waagent[1418]: 2024-02-12T19:47:11.024744Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:47:11.032947 waagent[1418]: 2024-02-12T19:47:11.032822Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:47:11.037668 waagent[1418]: 2024-02-12T19:47:11.037592Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:47:11.040515 waagent[1418]: 2024-02-12T19:47:11.040440Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:47:11.043818 waagent[1418]: 2024-02-12T19:47:11.043745Z INFO Daemon Daemon Activate resource disk Feb 12 19:47:11.046359 waagent[1418]: 2024-02-12T19:47:11.046290Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:47:11.056552 waagent[1418]: 2024-02-12T19:47:11.056466Z INFO Daemon Daemon Found device: None Feb 12 19:47:11.059215 waagent[1418]: 2024-02-12T19:47:11.059132Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:47:11.063400 waagent[1418]: 2024-02-12T19:47:11.063320Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:47:11.069482 waagent[1418]: 2024-02-12T19:47:11.069404Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:47:11.074246 waagent[1418]: 2024-02-12T19:47:11.074164Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:47:11.084048 waagent[1418]: 2024-02-12T19:47:11.083884Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:47:11.091644 waagent[1418]: 2024-02-12T19:47:11.091503Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:47:11.100249 waagent[1418]: 2024-02-12T19:47:11.092904Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:47:11.100249 waagent[1418]: 2024-02-12T19:47:11.093644Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:47:11.139052 waagent[1418]: 2024-02-12T19:47:11.138846Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:47:11.177944 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:47:11.186779 waagent[1418]: 2024-02-12T19:47:11.186643Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:47:11.202877 waagent[1418]: 2024-02-12T19:47:11.188078Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:47:11.202877 waagent[1418]: 2024-02-12T19:47:11.189064Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:47:11.202877 waagent[1418]: 2024-02-12T19:47:11.189815Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:47:11.202877 waagent[1418]: 2024-02-12T19:47:11.190972Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:47:11.202877 waagent[1418]: 2024-02-12T19:47:11.191629Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:47:11.231075 waagent[1418]: 2024-02-12T19:47:11.230978Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:47:11.235283 waagent[1418]: 2024-02-12T19:47:11.235235Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:47:11.238324 waagent[1418]: 2024-02-12T19:47:11.238262Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:47:11.851822 waagent[1418]: 2024-02-12T19:47:11.851665Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:47:11.864005 waagent[1418]: 2024-02-12T19:47:11.863925Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:47:11.867078 waagent[1418]: 2024-02-12T19:47:11.867007Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:47:11.936588 waagent[1418]: 2024-02-12T19:47:11.936451Z INFO Daemon Daemon Found private key matching thumbprint 13E3FE3FC2FFC7A59B4F1D417592B47997A77E36 Feb 12 19:47:11.951470 waagent[1418]: 2024-02-12T19:47:11.937995Z INFO Daemon Daemon Certificate with thumbprint A2971091CD7159C3DE57B50822EA13C3C479595F has no matching private key. Feb 12 19:47:11.951470 waagent[1418]: 2024-02-12T19:47:11.939247Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:47:11.989079 waagent[1418]: 2024-02-12T19:47:11.988957Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: e0fa7aa0-1e93-4513-904a-ea9b0af161f6 New eTag: 10681426097138171906] Feb 12 19:47:11.997023 waagent[1418]: 2024-02-12T19:47:11.990938Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:47:12.003267 waagent[1418]: 2024-02-12T19:47:12.003203Z INFO Daemon Daemon Starting provisioning Feb 12 19:47:12.017534 waagent[1418]: 2024-02-12T19:47:12.004579Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:47:12.017534 waagent[1418]: 2024-02-12T19:47:12.005415Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-4cc8fcdc9a] Feb 12 19:47:12.017534 waagent[1418]: 2024-02-12T19:47:12.009773Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-4cc8fcdc9a] Feb 12 19:47:12.017534 waagent[1418]: 2024-02-12T19:47:12.011281Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:47:12.017534 waagent[1418]: 2024-02-12T19:47:12.012281Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:47:12.025417 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:47:12.025681 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:47:12.025751 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:47:12.026110 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:47:12.030076 systemd-networkd[1199]: eth0: DHCPv6 lease lost Feb 12 19:47:12.031617 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:47:12.031820 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:47:12.034294 systemd[1]: Starting systemd-networkd.service... Feb 12 19:47:12.065377 systemd-networkd[1470]: enP15283s1: Link UP Feb 12 19:47:12.065386 systemd-networkd[1470]: enP15283s1: Gained carrier Feb 12 19:47:12.066878 systemd-networkd[1470]: eth0: Link UP Feb 12 19:47:12.066889 systemd-networkd[1470]: eth0: Gained carrier Feb 12 19:47:12.067355 systemd-networkd[1470]: lo: Link UP Feb 12 19:47:12.067365 systemd-networkd[1470]: lo: Gained carrier Feb 12 19:47:12.067680 systemd-networkd[1470]: eth0: Gained IPv6LL Feb 12 19:47:12.067968 systemd-networkd[1470]: Enumeration completed Feb 12 19:47:12.068109 systemd[1]: Started systemd-networkd.service. Feb 12 19:47:12.071177 waagent[1418]: 2024-02-12T19:47:12.070041Z INFO Daemon Daemon Create user account if not exists Feb 12 19:47:12.070544 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:47:12.073780 waagent[1418]: 2024-02-12T19:47:12.071722Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:47:12.073780 waagent[1418]: 2024-02-12T19:47:12.072753Z INFO Daemon Daemon Configure sudoer Feb 12 19:47:12.074149 waagent[1418]: 2024-02-12T19:47:12.074092Z INFO Daemon Daemon Configure sshd Feb 12 19:47:12.075061 waagent[1418]: 2024-02-12T19:47:12.075010Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:47:12.080855 systemd-networkd[1470]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:47:12.121088 systemd-networkd[1470]: eth0: DHCPv4 address 10.200.8.13/24, gateway 10.200.8.1 acquired from 168.63.129.16 Feb 12 19:47:12.123583 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:47:42.434876 waagent[1418]: 2024-02-12T19:47:42.434771Z INFO Daemon Daemon Provisioning complete Feb 12 19:47:42.451895 waagent[1418]: 2024-02-12T19:47:42.451805Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:47:42.458970 waagent[1418]: 2024-02-12T19:47:42.453204Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:47:42.458970 waagent[1418]: 2024-02-12T19:47:42.454924Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:47:42.724260 waagent[1482]: 2024-02-12T19:47:42.724084Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:47:42.724979 waagent[1482]: 2024-02-12T19:47:42.724906Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:42.725143 waagent[1482]: 2024-02-12T19:47:42.725085Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:42.737204 waagent[1482]: 2024-02-12T19:47:42.737130Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:47:42.737370 waagent[1482]: 2024-02-12T19:47:42.737314Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:47:42.802637 waagent[1482]: 2024-02-12T19:47:42.802506Z INFO ExtHandler ExtHandler Found private key matching thumbprint 13E3FE3FC2FFC7A59B4F1D417592B47997A77E36 Feb 12 19:47:42.802870 waagent[1482]: 2024-02-12T19:47:42.802808Z INFO ExtHandler ExtHandler Certificate with thumbprint A2971091CD7159C3DE57B50822EA13C3C479595F has no matching private key. Feb 12 19:47:42.803140 waagent[1482]: 2024-02-12T19:47:42.803085Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:47:42.822498 waagent[1482]: 2024-02-12T19:47:42.822418Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: cd16b763-696a-47b7-9769-a70b39a7df3b New eTag: 10681426097138171906] Feb 12 19:47:42.823136 waagent[1482]: 2024-02-12T19:47:42.823073Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:47:42.861130 waagent[1482]: 2024-02-12T19:47:42.860972Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:47:42.870143 waagent[1482]: 2024-02-12T19:47:42.870062Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1482 Feb 12 19:47:42.873577 waagent[1482]: 2024-02-12T19:47:42.873505Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:47:42.874817 waagent[1482]: 2024-02-12T19:47:42.874755Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:47:42.903272 waagent[1482]: 2024-02-12T19:47:42.903209Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:47:42.903668 waagent[1482]: 2024-02-12T19:47:42.903599Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:47:42.911457 waagent[1482]: 2024-02-12T19:47:42.911399Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:47:42.911929 waagent[1482]: 2024-02-12T19:47:42.911868Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:47:42.913010 waagent[1482]: 2024-02-12T19:47:42.912922Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:47:42.914324 waagent[1482]: 2024-02-12T19:47:42.914266Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:47:42.914868 waagent[1482]: 2024-02-12T19:47:42.914813Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:42.915039 waagent[1482]: 2024-02-12T19:47:42.914976Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:42.915556 waagent[1482]: 2024-02-12T19:47:42.915499Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:47:42.915840 waagent[1482]: 2024-02-12T19:47:42.915783Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:47:42.915840 waagent[1482]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:47:42.915840 waagent[1482]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:47:42.915840 waagent[1482]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:47:42.915840 waagent[1482]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:42.915840 waagent[1482]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:42.915840 waagent[1482]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:42.918952 waagent[1482]: 2024-02-12T19:47:42.918749Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:47:42.919811 waagent[1482]: 2024-02-12T19:47:42.919741Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:47:42.920201 waagent[1482]: 2024-02-12T19:47:42.920139Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:42.920297 waagent[1482]: 2024-02-12T19:47:42.920242Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:47:42.920905 waagent[1482]: 2024-02-12T19:47:42.920847Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:42.921611 waagent[1482]: 2024-02-12T19:47:42.921543Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:47:42.921765 waagent[1482]: 2024-02-12T19:47:42.921716Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:47:42.921900 waagent[1482]: 2024-02-12T19:47:42.921856Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:47:42.922430 waagent[1482]: 2024-02-12T19:47:42.922365Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:47:42.922708 waagent[1482]: 2024-02-12T19:47:42.922649Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:47:42.923278 waagent[1482]: 2024-02-12T19:47:42.923227Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:47:42.939770 waagent[1482]: 2024-02-12T19:47:42.939699Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:47:42.940812 waagent[1482]: 2024-02-12T19:47:42.940754Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:47:42.942165 waagent[1482]: 2024-02-12T19:47:42.942097Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:47:42.946674 waagent[1482]: 2024-02-12T19:47:42.946624Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1470' Feb 12 19:47:42.962357 waagent[1482]: 2024-02-12T19:47:42.962215Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:47:42.962357 waagent[1482]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:47:42.962357 waagent[1482]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:47:42.962357 waagent[1482]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:ca:d4 brd ff:ff:ff:ff:ff:ff Feb 12 19:47:42.962357 waagent[1482]: 3: enP15283s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:ca:d4 brd ff:ff:ff:ff:ff:ff\ altname enP15283p0s2 Feb 12 19:47:42.962357 waagent[1482]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:47:42.962357 waagent[1482]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:47:42.962357 waagent[1482]: 2: eth0 inet 10.200.8.13/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:47:42.962357 waagent[1482]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:47:42.962357 waagent[1482]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:47:42.962357 waagent[1482]: 2: eth0 inet6 fe80::20d:3aff:feb5:cad4/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:47:42.993417 waagent[1482]: 2024-02-12T19:47:42.993305Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:47:43.090468 waagent[1482]: 2024-02-12T19:47:43.090333Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:47:43.094585 waagent[1482]: 2024-02-12T19:47:43.094479Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:47:43.094585 waagent[1482]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:43.094585 waagent[1482]: pkts bytes target prot opt in out source destination Feb 12 19:47:43.094585 waagent[1482]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:43.094585 waagent[1482]: pkts bytes target prot opt in out source destination Feb 12 19:47:43.094585 waagent[1482]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:43.094585 waagent[1482]: pkts bytes target prot opt in out source destination Feb 12 19:47:43.094585 waagent[1482]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:47:43.094585 waagent[1482]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:47:43.096631 waagent[1482]: 2024-02-12T19:47:43.096575Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:47:43.277329 waagent[1482]: 2024-02-12T19:47:43.277187Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:47:43.459130 waagent[1418]: 2024-02-12T19:47:43.458915Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:47:43.465379 waagent[1418]: 2024-02-12T19:47:43.465313Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:47:44.460172 waagent[1521]: 2024-02-12T19:47:44.460051Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:47:44.460883 waagent[1521]: 2024-02-12T19:47:44.460807Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:47:44.461049 waagent[1521]: 2024-02-12T19:47:44.460978Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:47:44.470736 waagent[1521]: 2024-02-12T19:47:44.470622Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:47:44.471168 waagent[1521]: 2024-02-12T19:47:44.471104Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:44.471343 waagent[1521]: 2024-02-12T19:47:44.471292Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:44.483054 waagent[1521]: 2024-02-12T19:47:44.482963Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:47:44.491424 waagent[1521]: 2024-02-12T19:47:44.491357Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:47:44.492362 waagent[1521]: 2024-02-12T19:47:44.492299Z INFO ExtHandler Feb 12 19:47:44.492512 waagent[1521]: 2024-02-12T19:47:44.492459Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4deb4df9-19ec-4b18-8ada-e3946d76802b eTag: 10681426097138171906 source: Fabric] Feb 12 19:47:44.493217 waagent[1521]: 2024-02-12T19:47:44.493158Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:47:44.494298 waagent[1521]: 2024-02-12T19:47:44.494234Z INFO ExtHandler Feb 12 19:47:44.494434 waagent[1521]: 2024-02-12T19:47:44.494380Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:47:44.500981 waagent[1521]: 2024-02-12T19:47:44.500926Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:47:44.501444 waagent[1521]: 2024-02-12T19:47:44.501395Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:47:44.521639 waagent[1521]: 2024-02-12T19:47:44.521569Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:47:44.587436 waagent[1521]: 2024-02-12T19:47:44.587300Z INFO ExtHandler Downloaded certificate {'thumbprint': 'A2971091CD7159C3DE57B50822EA13C3C479595F', 'hasPrivateKey': False} Feb 12 19:47:44.588467 waagent[1521]: 2024-02-12T19:47:44.588392Z INFO ExtHandler Downloaded certificate {'thumbprint': '13E3FE3FC2FFC7A59B4F1D417592B47997A77E36', 'hasPrivateKey': True} Feb 12 19:47:44.589438 waagent[1521]: 2024-02-12T19:47:44.589375Z INFO ExtHandler Fetch goal state completed Feb 12 19:47:44.616010 waagent[1521]: 2024-02-12T19:47:44.615907Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1521 Feb 12 19:47:44.619304 waagent[1521]: 2024-02-12T19:47:44.619235Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:47:44.620732 waagent[1521]: 2024-02-12T19:47:44.620672Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:47:44.625874 waagent[1521]: 2024-02-12T19:47:44.625818Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:47:44.626262 waagent[1521]: 2024-02-12T19:47:44.626203Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:47:44.634121 waagent[1521]: 2024-02-12T19:47:44.634067Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:47:44.634571 waagent[1521]: 2024-02-12T19:47:44.634514Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:47:44.647759 waagent[1521]: 2024-02-12T19:47:44.647653Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:47:44.650466 waagent[1521]: 2024-02-12T19:47:44.650364Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:47:44.655105 waagent[1521]: 2024-02-12T19:47:44.655045Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:47:44.656487 waagent[1521]: 2024-02-12T19:47:44.656428Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:47:44.656937 waagent[1521]: 2024-02-12T19:47:44.656881Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:44.657113 waagent[1521]: 2024-02-12T19:47:44.657063Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:44.657632 waagent[1521]: 2024-02-12T19:47:44.657573Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:47:44.657907 waagent[1521]: 2024-02-12T19:47:44.657852Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:47:44.657907 waagent[1521]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:47:44.657907 waagent[1521]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:47:44.657907 waagent[1521]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:47:44.657907 waagent[1521]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:44.657907 waagent[1521]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:44.657907 waagent[1521]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:47:44.660133 waagent[1521]: 2024-02-12T19:47:44.660012Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:47:44.661149 waagent[1521]: 2024-02-12T19:47:44.661087Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:47:44.661399 waagent[1521]: 2024-02-12T19:47:44.661346Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:47:44.664588 waagent[1521]: 2024-02-12T19:47:44.664469Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:47:44.665090 waagent[1521]: 2024-02-12T19:47:44.665028Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:47:44.666011 waagent[1521]: 2024-02-12T19:47:44.664892Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:47:44.666947 waagent[1521]: 2024-02-12T19:47:44.666876Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:47:44.669483 waagent[1521]: 2024-02-12T19:47:44.669378Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:47:44.670041 waagent[1521]: 2024-02-12T19:47:44.669958Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:47:44.670263 waagent[1521]: 2024-02-12T19:47:44.670199Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:47:44.670434 waagent[1521]: 2024-02-12T19:47:44.670367Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:47:44.675844 waagent[1521]: 2024-02-12T19:47:44.675785Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:47:44.675844 waagent[1521]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:47:44.675844 waagent[1521]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:47:44.675844 waagent[1521]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:ca:d4 brd ff:ff:ff:ff:ff:ff Feb 12 19:47:44.675844 waagent[1521]: 3: enP15283s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:b5:ca:d4 brd ff:ff:ff:ff:ff:ff\ altname enP15283p0s2 Feb 12 19:47:44.675844 waagent[1521]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:47:44.675844 waagent[1521]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:47:44.675844 waagent[1521]: 2: eth0 inet 10.200.8.13/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:47:44.675844 waagent[1521]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:47:44.675844 waagent[1521]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:47:44.675844 waagent[1521]: 2: eth0 inet6 fe80::20d:3aff:feb5:cad4/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:47:44.683715 waagent[1521]: 2024-02-12T19:47:44.683637Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:47:44.687214 waagent[1521]: 2024-02-12T19:47:44.687155Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:47:44.743682 waagent[1521]: 2024-02-12T19:47:44.743545Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:47:44.743682 waagent[1521]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:44.743682 waagent[1521]: pkts bytes target prot opt in out source destination Feb 12 19:47:44.743682 waagent[1521]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:44.743682 waagent[1521]: pkts bytes target prot opt in out source destination Feb 12 19:47:44.743682 waagent[1521]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:47:44.743682 waagent[1521]: pkts bytes target prot opt in out source destination Feb 12 19:47:44.743682 waagent[1521]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:47:44.743682 waagent[1521]: 161 18177 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:47:44.743682 waagent[1521]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:47:44.761773 waagent[1521]: 2024-02-12T19:47:44.761710Z INFO ExtHandler ExtHandler Feb 12 19:47:44.762715 waagent[1521]: 2024-02-12T19:47:44.762656Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 6fe460d8-2ee3-4a93-9268-3515713fdcb2 correlation 3f0bb8ae-a616-495b-aff6-e402e84bad1e created: 2024-02-12T19:45:08.202614Z] Feb 12 19:47:44.763548 waagent[1521]: 2024-02-12T19:47:44.763486Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:47:44.765270 waagent[1521]: 2024-02-12T19:47:44.765213Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 12 19:47:44.785279 waagent[1521]: 2024-02-12T19:47:44.785200Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:47:44.795930 waagent[1521]: 2024-02-12T19:47:44.795849Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 625B11B9-EC25-4829-8FB2-86105F142EE4;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:47:50.232189 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Feb 12 19:47:50.926240 update_engine[1327]: I0212 19:47:50.926152 1327 update_attempter.cc:509] Updating boot flags... Feb 12 19:48:16.223207 systemd[1]: Created slice system-sshd.slice. Feb 12 19:48:16.225126 systemd[1]: Started sshd@0-10.200.8.13:22-10.200.12.6:51580.service. Feb 12 19:48:16.906350 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 51580 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:16.908054 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:16.912641 systemd-logind[1326]: New session 3 of user core. Feb 12 19:48:16.913579 systemd[1]: Started session-3.scope. Feb 12 19:48:17.444889 systemd[1]: Started sshd@1-10.200.8.13:22-10.200.12.6:60748.service. Feb 12 19:48:18.082491 sshd[1634]: Accepted publickey for core from 10.200.12.6 port 60748 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:18.084184 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:18.088823 systemd[1]: Started session-4.scope. Feb 12 19:48:18.089441 systemd-logind[1326]: New session 4 of user core. Feb 12 19:48:18.522184 sshd[1634]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:18.525510 systemd[1]: sshd@1-10.200.8.13:22-10.200.12.6:60748.service: Deactivated successfully. Feb 12 19:48:18.526445 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:48:18.527116 systemd-logind[1326]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:48:18.527851 systemd-logind[1326]: Removed session 4. Feb 12 19:48:18.625147 systemd[1]: Started sshd@2-10.200.8.13:22-10.200.12.6:60754.service. Feb 12 19:48:19.236581 sshd[1640]: Accepted publickey for core from 10.200.12.6 port 60754 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:19.238217 sshd[1640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:19.243369 systemd[1]: Started session-5.scope. Feb 12 19:48:19.243953 systemd-logind[1326]: New session 5 of user core. Feb 12 19:48:19.669396 sshd[1640]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:19.672660 systemd[1]: sshd@2-10.200.8.13:22-10.200.12.6:60754.service: Deactivated successfully. Feb 12 19:48:19.673666 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:48:19.674437 systemd-logind[1326]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:48:19.675360 systemd-logind[1326]: Removed session 5. Feb 12 19:48:19.774914 systemd[1]: Started sshd@3-10.200.8.13:22-10.200.12.6:60766.service. Feb 12 19:48:20.415282 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 60766 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:20.416845 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:20.421550 systemd[1]: Started session-6.scope. Feb 12 19:48:20.422165 systemd-logind[1326]: New session 6 of user core. Feb 12 19:48:20.864573 sshd[1646]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:20.868113 systemd[1]: sshd@3-10.200.8.13:22-10.200.12.6:60766.service: Deactivated successfully. Feb 12 19:48:20.869112 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:48:20.869851 systemd-logind[1326]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:48:20.870806 systemd-logind[1326]: Removed session 6. Feb 12 19:48:20.968532 systemd[1]: Started sshd@4-10.200.8.13:22-10.200.12.6:60770.service. Feb 12 19:48:21.582965 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 60770 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:21.584599 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:21.589885 systemd[1]: Started session-7.scope. Feb 12 19:48:21.590334 systemd-logind[1326]: New session 7 of user core. Feb 12 19:48:22.015170 sudo[1655]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:48:22.015445 sudo[1655]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:22.028198 dbus-daemon[1309]: Ѝ%\xad\xb0U: received setenforce notice (enforcing=-776672656) Feb 12 19:48:22.030010 sudo[1655]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:22.134646 sshd[1652]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:22.138382 systemd[1]: sshd@4-10.200.8.13:22-10.200.12.6:60770.service: Deactivated successfully. Feb 12 19:48:22.139522 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:48:22.140262 systemd-logind[1326]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:48:22.141087 systemd-logind[1326]: Removed session 7. Feb 12 19:48:22.240301 systemd[1]: Started sshd@5-10.200.8.13:22-10.200.12.6:60772.service. Feb 12 19:48:22.863248 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 60772 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:22.864935 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:22.869839 systemd[1]: Started session-8.scope. Feb 12 19:48:22.870454 systemd-logind[1326]: New session 8 of user core. Feb 12 19:48:23.206247 sudo[1663]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:48:23.206516 sudo[1663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:23.209316 sudo[1663]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:23.213883 sudo[1662]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:48:23.214191 sudo[1662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:23.222978 systemd[1]: Stopping audit-rules.service... Feb 12 19:48:23.237505 kernel: kauditd_printk_skb: 95 callbacks suppressed Feb 12 19:48:23.237622 kernel: audit: type=1305 audit(1707767303.223:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:48:23.223000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:48:23.225294 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:48:23.237853 auditctl[1666]: No rules Feb 12 19:48:23.225447 systemd[1]: Stopped audit-rules.service. Feb 12 19:48:23.226909 systemd[1]: Starting audit-rules.service... Feb 12 19:48:23.223000 audit[1666]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd754d66e0 a2=420 a3=0 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.249053 systemd[1]: Finished audit-rules.service. Feb 12 19:48:23.250283 augenrules[1683]: No rules Feb 12 19:48:23.254253 kernel: audit: type=1300 audit(1707767303.223:177): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd754d66e0 a2=420 a3=0 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:23.253853 sudo[1662]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:23.223000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:48:23.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.269034 kernel: audit: type=1327 audit(1707767303.223:177): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:48:23.269107 kernel: audit: type=1131 audit(1707767303.224:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.269133 kernel: audit: type=1130 audit(1707767303.248:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.280012 kernel: audit: type=1106 audit(1707767303.252:180): pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.252000 audit[1662]: USER_END pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.253000 audit[1662]: CRED_DISP pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.301727 kernel: audit: type=1104 audit(1707767303.253:181): pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.353669 sshd[1659]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:23.353000 audit[1659]: USER_END pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:23.356799 systemd[1]: sshd@5-10.200.8.13:22-10.200.12.6:60772.service: Deactivated successfully. Feb 12 19:48:23.357797 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:48:23.359119 systemd-logind[1326]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:48:23.360007 systemd-logind[1326]: Removed session 8. Feb 12 19:48:23.354000 audit[1659]: CRED_DISP pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:23.382132 kernel: audit: type=1106 audit(1707767303.353:182): pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:23.382215 kernel: audit: type=1104 audit(1707767303.354:183): pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:23.382237 kernel: audit: type=1131 audit(1707767303.354:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.12.6:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.13:22-10.200.12.6:60772 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:23.458434 systemd[1]: Started sshd@6-10.200.8.13:22-10.200.12.6:60780.service. Feb 12 19:48:23.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.12.6:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:24.085000 audit[1689]: USER_ACCT pid=1689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:24.086866 sshd[1689]: Accepted publickey for core from 10.200.12.6 port 60780 ssh2: RSA SHA256:s7YymQosdnJ6BBn11oTaBnKtgbkZHlGvzOt+RffOmrs Feb 12 19:48:24.086000 audit[1689]: CRED_ACQ pid=1689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:24.086000 audit[1689]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd287ba780 a2=3 a3=0 items=0 ppid=1 pid=1689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:24.086000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:48:24.088357 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:48:24.093529 systemd[1]: Started session-9.scope. Feb 12 19:48:24.094195 systemd-logind[1326]: New session 9 of user core. Feb 12 19:48:24.097000 audit[1689]: USER_START pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:24.099000 audit[1691]: CRED_ACQ pid=1691 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:24.429000 audit[1692]: USER_ACCT pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:24.430494 sudo[1692]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:48:24.429000 audit[1692]: CRED_REFR pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:24.430839 sudo[1692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:48:24.431000 audit[1692]: USER_START pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:25.039251 systemd[1]: Reloading. Feb 12 19:48:25.125551 /usr/lib/systemd/system-generators/torcx-generator[1724]: time="2024-02-12T19:48:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:48:25.125590 /usr/lib/systemd/system-generators/torcx-generator[1724]: time="2024-02-12T19:48:25Z" level=info msg="torcx already run" Feb 12 19:48:25.215454 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:48:25.215473 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:48:25.233488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit: BPF prog-id=38 op=LOAD Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.297000 audit: BPF prog-id=39 op=LOAD Feb 12 19:48:25.297000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:48:25.297000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.300000 audit: BPF prog-id=40 op=LOAD Feb 12 19:48:25.300000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.303000 audit: BPF prog-id=41 op=LOAD Feb 12 19:48:25.303000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit: BPF prog-id=42 op=LOAD Feb 12 19:48:25.304000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit: BPF prog-id=43 op=LOAD Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.304000 audit: BPF prog-id=44 op=LOAD Feb 12 19:48:25.304000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:48:25.304000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit: BPF prog-id=45 op=LOAD Feb 12 19:48:25.306000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit: BPF prog-id=46 op=LOAD Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.306000 audit: BPF prog-id=47 op=LOAD Feb 12 19:48:25.306000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:48:25.306000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.307000 audit: BPF prog-id=48 op=LOAD Feb 12 19:48:25.308000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit: BPF prog-id=49 op=LOAD Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.308000 audit: BPF prog-id=50 op=LOAD Feb 12 19:48:25.308000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:48:25.308000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.309000 audit: BPF prog-id=51 op=LOAD Feb 12 19:48:25.309000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:25.310000 audit: BPF prog-id=52 op=LOAD Feb 12 19:48:25.310000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:48:25.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:25.321432 systemd[1]: Started kubelet.service. Feb 12 19:48:25.336974 systemd[1]: Starting coreos-metadata.service... Feb 12 19:48:25.400793 coreos-metadata[1794]: Feb 12 19:48:25.400 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:48:25.403580 kubelet[1784]: E0212 19:48:25.403526 1784 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:48:25.404291 coreos-metadata[1794]: Feb 12 19:48:25.404 INFO Fetch successful Feb 12 19:48:25.404405 coreos-metadata[1794]: Feb 12 19:48:25.404 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 12 19:48:25.405581 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:48:25.405741 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:48:25.405000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:48:25.407081 coreos-metadata[1794]: Feb 12 19:48:25.406 INFO Fetch successful Feb 12 19:48:25.407081 coreos-metadata[1794]: Feb 12 19:48:25.407 INFO Fetching http://168.63.129.16/machine/03634c0e-9549-4156-ab50-0e98478ee5ac/bdf92e9a%2D9419%2D4b51%2D9be0%2D9b9eaff9bab5.%5Fci%2D3510.3.2%2Da%2D4cc8fcdc9a?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 12 19:48:25.408811 coreos-metadata[1794]: Feb 12 19:48:25.408 INFO Fetch successful Feb 12 19:48:25.440986 coreos-metadata[1794]: Feb 12 19:48:25.440 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:48:25.452626 coreos-metadata[1794]: Feb 12 19:48:25.452 INFO Fetch successful Feb 12 19:48:25.461589 systemd[1]: Finished coreos-metadata.service. Feb 12 19:48:25.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:26.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:26.642000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:26.643063 systemd[1]: Stopped kubelet.service. Feb 12 19:48:26.657859 systemd[1]: Reloading. Feb 12 19:48:26.746573 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-12T19:48:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:48:26.751696 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-12T19:48:26Z" level=info msg="torcx already run" Feb 12 19:48:26.835063 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:48:26.835084 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:48:26.853078 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:48:26.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit: BPF prog-id=53 op=LOAD Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.918000 audit: BPF prog-id=54 op=LOAD Feb 12 19:48:26.918000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:48:26.918000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.921000 audit: BPF prog-id=55 op=LOAD Feb 12 19:48:26.921000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit: BPF prog-id=56 op=LOAD Feb 12 19:48:26.924000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit: BPF prog-id=57 op=LOAD Feb 12 19:48:26.925000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit: BPF prog-id=58 op=LOAD Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.925000 audit: BPF prog-id=59 op=LOAD Feb 12 19:48:26.925000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:48:26.925000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit: BPF prog-id=60 op=LOAD Feb 12 19:48:26.927000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit: BPF prog-id=61 op=LOAD Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.927000 audit: BPF prog-id=62 op=LOAD Feb 12 19:48:26.927000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:48:26.927000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit: BPF prog-id=63 op=LOAD Feb 12 19:48:26.928000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit: BPF prog-id=64 op=LOAD Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.928000 audit: BPF prog-id=65 op=LOAD Feb 12 19:48:26.929000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:48:26.929000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit: BPF prog-id=66 op=LOAD Feb 12 19:48:26.930000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:26.930000 audit: BPF prog-id=67 op=LOAD Feb 12 19:48:26.930000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:48:26.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:26.949481 systemd[1]: Started kubelet.service. Feb 12 19:48:27.003880 kubelet[1913]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:48:27.004228 kubelet[1913]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:48:27.004272 kubelet[1913]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:48:27.004388 kubelet[1913]: I0212 19:48:27.004347 1913 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:48:27.328258 kubelet[1913]: I0212 19:48:27.323855 1913 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:48:27.328258 kubelet[1913]: I0212 19:48:27.323885 1913 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:48:27.328258 kubelet[1913]: I0212 19:48:27.324171 1913 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:48:27.328668 kubelet[1913]: I0212 19:48:27.328647 1913 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:48:27.334354 kubelet[1913]: I0212 19:48:27.334327 1913 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:48:27.334601 kubelet[1913]: I0212 19:48:27.334584 1913 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:48:27.335238 kubelet[1913]: I0212 19:48:27.335106 1913 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:48:27.335518 kubelet[1913]: I0212 19:48:27.335499 1913 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:48:27.335591 kubelet[1913]: I0212 19:48:27.335526 1913 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:48:27.335664 kubelet[1913]: I0212 19:48:27.335651 1913 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:48:27.335771 kubelet[1913]: I0212 19:48:27.335759 1913 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:48:27.335830 kubelet[1913]: I0212 19:48:27.335782 1913 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:48:27.336005 kubelet[1913]: I0212 19:48:27.335982 1913 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:48:27.336062 kubelet[1913]: I0212 19:48:27.336021 1913 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:48:27.339555 kubelet[1913]: E0212 19:48:27.339522 1913 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:27.339653 kubelet[1913]: E0212 19:48:27.339574 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:27.339731 kubelet[1913]: I0212 19:48:27.339688 1913 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:48:27.340309 kubelet[1913]: W0212 19:48:27.340287 1913 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:48:27.341374 kubelet[1913]: I0212 19:48:27.341353 1913 server.go:1232] "Started kubelet" Feb 12 19:48:27.343780 kubelet[1913]: E0212 19:48:27.343762 1913 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:48:27.343897 kubelet[1913]: E0212 19:48:27.343886 1913 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:48:27.342000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.342000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:27.342000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006d4cc0 a1=c000c2c810 a2=c0006d4c60 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.342000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:27.344580 kubelet[1913]: I0212 19:48:27.343950 1913 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:48:27.343000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.343000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:27.343000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000279900 a1=c000138738 a2=c000e41260 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.343000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:27.345243 kubelet[1913]: I0212 19:48:27.345148 1913 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:48:27.345332 kubelet[1913]: I0212 19:48:27.345269 1913 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:48:27.345476 kubelet[1913]: I0212 19:48:27.344026 1913 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:48:27.346341 kubelet[1913]: I0212 19:48:27.346318 1913 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:48:27.347739 kubelet[1913]: I0212 19:48:27.347719 1913 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:48:27.348454 kubelet[1913]: I0212 19:48:27.344060 1913 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:48:27.348775 kubelet[1913]: I0212 19:48:27.348758 1913 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:48:27.349289 kubelet[1913]: I0212 19:48:27.349273 1913 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:48:27.349710 kubelet[1913]: I0212 19:48:27.349699 1913 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:48:27.353705 kubelet[1913]: W0212 19:48:27.353685 1913 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:27.353797 kubelet[1913]: E0212 19:48:27.353723 1913 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:27.353937 kubelet[1913]: E0212 19:48:27.353922 1913 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.13\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:48:27.359925 kubelet[1913]: W0212 19:48:27.359901 1913 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:48:27.360058 kubelet[1913]: E0212 19:48:27.360046 1913 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.8.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:48:27.360344 kubelet[1913]: E0212 19:48:27.360239 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b33551611afd1d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 341331741, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 341331741, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.360706 kubelet[1913]: W0212 19:48:27.360691 1913 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:48:27.360828 kubelet[1913]: E0212 19:48:27.360817 1913 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:48:27.363682 kubelet[1913]: E0212 19:48:27.363608 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b335516141c486", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 343873158, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 343873158, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.364000 audit[1925]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.364000 audit[1925]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd65a9f920 a2=0 a3=7ffd65a9f90c items=0 ppid=1913 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:48:27.366000 audit[1926]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.366000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=132 a0=3 a1=7fff97c0a2d0 a2=0 a3=7fff97c0a2bc items=0 ppid=1913 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:48:27.373479 kubelet[1913]: I0212 19:48:27.373463 1913 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:48:27.373611 kubelet[1913]: I0212 19:48:27.373599 1913 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:48:27.373700 kubelet[1913]: I0212 19:48:27.373691 1913 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:48:27.373000 audit[1929]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.373000 audit[1929]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe947bdc40 a2=0 a3=7ffe947bdc2c items=0 ppid=1913 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:27.375000 audit[1931]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.375000 audit[1931]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6d7c4290 a2=0 a3=7ffe6d7c427c items=0 ppid=1913 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:27.378738 kubelet[1913]: I0212 19:48:27.378724 1913 policy_none.go:49] "None policy: Start" Feb 12 19:48:27.379059 kubelet[1913]: E0212 19:48:27.378934 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7a758", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372570456, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372570456, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.379623 kubelet[1913]: I0212 19:48:27.379609 1913 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:48:27.379727 kubelet[1913]: I0212 19:48:27.379718 1913 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:48:27.385191 kubelet[1913]: E0212 19:48:27.385089 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7c120", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372577056, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372577056, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.386208 kubelet[1913]: E0212 19:48:27.386147 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7cecc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372580556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372580556, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.388527 systemd[1]: Created slice kubepods.slice. Feb 12 19:48:27.391000 audit[1935]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.391000 audit[1935]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd7824ec10 a2=0 a3=7ffd7824ebfc items=0 ppid=1913 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.391000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:48:27.393193 kubelet[1913]: I0212 19:48:27.393140 1913 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:48:27.392000 audit[1936]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:27.392000 audit[1936]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd9efd1a70 a2=0 a3=7ffd9efd1a5c items=0 ppid=1913 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.392000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:48:27.394267 kubelet[1913]: I0212 19:48:27.394148 1913 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:48:27.394267 kubelet[1913]: I0212 19:48:27.394171 1913 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:48:27.394267 kubelet[1913]: I0212 19:48:27.394189 1913 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:48:27.394267 kubelet[1913]: E0212 19:48:27.394235 1913 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:48:27.394000 audit[1937]: NETFILTER_CFG table=mangle:12 family=2 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.394000 audit[1937]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeebb151a0 a2=0 a3=7ffeebb1518c items=0 ppid=1913 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.394000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:48:27.395000 audit[1938]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.395000 audit[1938]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffaaa537d0 a2=0 a3=7fffaaa537bc items=0 ppid=1913 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:48:27.396000 audit[1939]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:27.396000 audit[1939]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcde12cea0 a2=0 a3=7ffcde12ce8c items=0 ppid=1913 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.396000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:48:27.397000 audit[1940]: NETFILTER_CFG table=mangle:15 family=10 entries=1 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:27.397000 audit[1940]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8d23dc10 a2=0 a3=7ffd8d23dbfc items=0 ppid=1913 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.397000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:48:27.398000 audit[1941]: NETFILTER_CFG table=nat:16 family=10 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:27.398000 audit[1941]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffcb83b9e90 a2=0 a3=7ffcb83b9e7c items=0 ppid=1913 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:48:27.399000 audit[1942]: NETFILTER_CFG table=filter:17 family=10 entries=2 op=nft_register_chain pid=1942 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:27.399000 audit[1942]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdc2a3fd70 a2=0 a3=7ffdc2a3fd5c items=0 ppid=1913 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.399000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:48:27.402609 kubelet[1913]: W0212 19:48:27.402475 1913 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:48:27.402609 kubelet[1913]: E0212 19:48:27.402521 1913 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:48:27.404211 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:48:27.407248 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:48:27.413566 kubelet[1913]: I0212 19:48:27.413542 1913 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:48:27.412000 audit[1913]: AVC avc: denied { mac_admin } for pid=1913 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:27.412000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:48:27.412000 audit[1913]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c7d140 a1=c000e00930 a2=c000c7d110 a3=25 items=0 ppid=1 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:27.412000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:48:27.413882 kubelet[1913]: I0212 19:48:27.413631 1913 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:48:27.413882 kubelet[1913]: I0212 19:48:27.413816 1913 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:48:27.415517 kubelet[1913]: E0212 19:48:27.415482 1913 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.8.13\" not found" Feb 12 19:48:27.417176 kubelet[1913]: E0212 19:48:27.417099 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b33551658c0b19", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 415849753, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 415849753, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.450804 kubelet[1913]: I0212 19:48:27.450766 1913 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.13" Feb 12 19:48:27.451603 kubelet[1913]: E0212 19:48:27.451517 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7a758", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372570456, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 450109289, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7a758" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.451924 kubelet[1913]: E0212 19:48:27.451717 1913 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.13" Feb 12 19:48:27.452796 kubelet[1913]: E0212 19:48:27.452727 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7c120", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372577056, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 450123189, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7c120" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.453735 kubelet[1913]: E0212 19:48:27.453675 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7cecc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372580556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 450126289, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7cecc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.555469 kubelet[1913]: E0212 19:48:27.555433 1913 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.13\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:48:27.653571 kubelet[1913]: I0212 19:48:27.653537 1913 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.13" Feb 12 19:48:27.654880 kubelet[1913]: E0212 19:48:27.654856 1913 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.13" Feb 12 19:48:27.655046 kubelet[1913]: E0212 19:48:27.654869 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7a758", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372570456, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 653482687, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7a758" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.655960 kubelet[1913]: E0212 19:48:27.655884 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7c120", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372577056, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 653493987, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7c120" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.656766 kubelet[1913]: E0212 19:48:27.656712 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7cecc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372580556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 653497687, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7cecc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:27.957568 kubelet[1913]: E0212 19:48:27.957461 1913 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.8.13\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:48:28.056943 kubelet[1913]: I0212 19:48:28.056899 1913 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.13" Feb 12 19:48:28.058312 kubelet[1913]: E0212 19:48:28.058285 1913 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.8.13" Feb 12 19:48:28.058471 kubelet[1913]: E0212 19:48:28.058265 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7a758", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.8.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372570456, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 56836651, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7a758" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:28.059430 kubelet[1913]: E0212 19:48:28.059358 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7c120", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.8.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372577056, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 56860051, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7c120" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:28.060225 kubelet[1913]: E0212 19:48:28.060158 1913 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13.17b3355162f7cecc", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.8.13", UID:"10.200.8.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.8.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.8.13"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 48, 27, 372580556, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 56864551, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.8.13"}': 'events "10.200.8.13.17b3355162f7cecc" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:48:28.303597 kubelet[1913]: W0212 19:48:28.303487 1913 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:28.303809 kubelet[1913]: E0212 19:48:28.303792 1913 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:48:28.328041 kubelet[1913]: I0212 19:48:28.327963 1913 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:48:28.340406 kubelet[1913]: E0212 19:48:28.340355 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:28.715483 kubelet[1913]: E0212 19:48:28.715446 1913 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.8.13" not found Feb 12 19:48:28.762008 kubelet[1913]: E0212 19:48:28.761960 1913 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.8.13\" not found" node="10.200.8.13" Feb 12 19:48:28.859659 kubelet[1913]: I0212 19:48:28.859622 1913 kubelet_node_status.go:70] "Attempting to register node" node="10.200.8.13" Feb 12 19:48:28.864747 kubelet[1913]: I0212 19:48:28.864706 1913 kubelet_node_status.go:73] "Successfully registered node" node="10.200.8.13" Feb 12 19:48:28.967000 audit[1692]: USER_END pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:28.968324 sudo[1692]: pam_unix(sudo:session): session closed for user root Feb 12 19:48:28.971525 kernel: kauditd_printk_skb: 409 callbacks suppressed Feb 12 19:48:28.971589 kernel: audit: type=1106 audit(1707767308.967:559): pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:28.967000 audit[1692]: CRED_DISP pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:28.985466 kubelet[1913]: I0212 19:48:28.985447 1913 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:48:28.986072 env[1333]: time="2024-02-12T19:48:28.985982376Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:48:28.986514 kubelet[1913]: I0212 19:48:28.986500 1913 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:48:28.994749 kernel: audit: type=1104 audit(1707767308.967:560): pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.066801 sshd[1689]: pam_unix(sshd:session): session closed for user core Feb 12 19:48:29.067000 audit[1689]: USER_END pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.070780 systemd[1]: sshd@6-10.200.8.13:22-10.200.12.6:60780.service: Deactivated successfully. Feb 12 19:48:29.071575 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:48:29.073308 systemd-logind[1326]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:48:29.074422 systemd-logind[1326]: Removed session 9. Feb 12 19:48:29.067000 audit[1689]: CRED_DISP pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.087018 kernel: audit: type=1106 audit(1707767309.067:561): pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.087070 kernel: audit: type=1104 audit(1707767309.067:562): pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:48:29.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.12.6:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.115226 kernel: audit: type=1131 audit(1707767309.070:563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.13:22-10.200.12.6:60780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:48:29.341329 kubelet[1913]: I0212 19:48:29.340944 1913 apiserver.go:52] "Watching apiserver" Feb 12 19:48:29.341329 kubelet[1913]: E0212 19:48:29.340965 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:29.343507 kubelet[1913]: I0212 19:48:29.343477 1913 topology_manager.go:215] "Topology Admit Handler" podUID="b04e4e2b-fb2e-478a-8e14-edb0e910c608" podNamespace="calico-system" podName="calico-node-tkfn2" Feb 12 19:48:29.343656 kubelet[1913]: I0212 19:48:29.343601 1913 topology_manager.go:215] "Topology Admit Handler" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" podNamespace="calico-system" podName="csi-node-driver-687cb" Feb 12 19:48:29.343716 kubelet[1913]: I0212 19:48:29.343695 1913 topology_manager.go:215] "Topology Admit Handler" podUID="0b4072d7-2a2a-4d54-8b81-50a56d2b1aff" podNamespace="kube-system" podName="kube-proxy-r4x5z" Feb 12 19:48:29.344679 kubelet[1913]: E0212 19:48:29.344643 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:29.349845 systemd[1]: Created slice kubepods-besteffort-pod0b4072d7_2a2a_4d54_8b81_50a56d2b1aff.slice. Feb 12 19:48:29.352494 kubelet[1913]: I0212 19:48:29.352473 1913 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:48:29.361205 kubelet[1913]: I0212 19:48:29.360896 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/e5c3e20a-a07c-417a-ab09-4d550ade8b72-registration-dir\") pod \"csi-node-driver-687cb\" (UID: \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\") " pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:29.365329 kubelet[1913]: I0212 19:48:29.365025 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7bj59\" (UniqueName: \"kubernetes.io/projected/e5c3e20a-a07c-417a-ab09-4d550ade8b72-kube-api-access-7bj59\") pod \"csi-node-driver-687cb\" (UID: \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\") " pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:29.365329 kubelet[1913]: I0212 19:48:29.365068 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0b4072d7-2a2a-4d54-8b81-50a56d2b1aff-lib-modules\") pod \"kube-proxy-r4x5z\" (UID: \"0b4072d7-2a2a-4d54-8b81-50a56d2b1aff\") " pod="kube-system/kube-proxy-r4x5z" Feb 12 19:48:29.365329 kubelet[1913]: I0212 19:48:29.365098 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-xtables-lock\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365141 systemd[1]: Created slice kubepods-besteffort-podb04e4e2b_fb2e_478a_8e14_edb0e910c608.slice. Feb 12 19:48:29.365607 kubelet[1913]: I0212 19:48:29.365545 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b04e4e2b-fb2e-478a-8e14-edb0e910c608-node-certs\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365655 kubelet[1913]: I0212 19:48:29.365607 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pzmv8\" (UniqueName: \"kubernetes.io/projected/b04e4e2b-fb2e-478a-8e14-edb0e910c608-kube-api-access-pzmv8\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365655 kubelet[1913]: I0212 19:48:29.365638 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/e5c3e20a-a07c-417a-ab09-4d550ade8b72-kubelet-dir\") pod \"csi-node-driver-687cb\" (UID: \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\") " pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:29.365740 kubelet[1913]: I0212 19:48:29.365666 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/e5c3e20a-a07c-417a-ab09-4d550ade8b72-socket-dir\") pod \"csi-node-driver-687cb\" (UID: \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\") " pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:29.365740 kubelet[1913]: I0212 19:48:29.365695 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v7brw\" (UniqueName: \"kubernetes.io/projected/0b4072d7-2a2a-4d54-8b81-50a56d2b1aff-kube-api-access-v7brw\") pod \"kube-proxy-r4x5z\" (UID: \"0b4072d7-2a2a-4d54-8b81-50a56d2b1aff\") " pod="kube-system/kube-proxy-r4x5z" Feb 12 19:48:29.365740 kubelet[1913]: I0212 19:48:29.365724 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-var-run-calico\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365848 kubelet[1913]: I0212 19:48:29.365752 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-cni-bin-dir\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365848 kubelet[1913]: I0212 19:48:29.365782 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-cni-net-dir\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.365848 kubelet[1913]: I0212 19:48:29.365811 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/e5c3e20a-a07c-417a-ab09-4d550ade8b72-varrun\") pod \"csi-node-driver-687cb\" (UID: \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\") " pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:29.365848 kubelet[1913]: I0212 19:48:29.365841 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0b4072d7-2a2a-4d54-8b81-50a56d2b1aff-kube-proxy\") pod \"kube-proxy-r4x5z\" (UID: \"0b4072d7-2a2a-4d54-8b81-50a56d2b1aff\") " pod="kube-system/kube-proxy-r4x5z" Feb 12 19:48:29.366018 kubelet[1913]: I0212 19:48:29.365870 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0b4072d7-2a2a-4d54-8b81-50a56d2b1aff-xtables-lock\") pod \"kube-proxy-r4x5z\" (UID: \"0b4072d7-2a2a-4d54-8b81-50a56d2b1aff\") " pod="kube-system/kube-proxy-r4x5z" Feb 12 19:48:29.366018 kubelet[1913]: I0212 19:48:29.365901 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-lib-modules\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.366018 kubelet[1913]: I0212 19:48:29.365932 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-policysync\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.366018 kubelet[1913]: I0212 19:48:29.365965 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-var-lib-calico\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.366018 kubelet[1913]: I0212 19:48:29.366010 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b04e4e2b-fb2e-478a-8e14-edb0e910c608-tigera-ca-bundle\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.366295 kubelet[1913]: I0212 19:48:29.366042 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-cni-log-dir\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.366295 kubelet[1913]: I0212 19:48:29.366076 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b04e4e2b-fb2e-478a-8e14-edb0e910c608-flexvol-driver-host\") pod \"calico-node-tkfn2\" (UID: \"b04e4e2b-fb2e-478a-8e14-edb0e910c608\") " pod="calico-system/calico-node-tkfn2" Feb 12 19:48:29.470795 kubelet[1913]: E0212 19:48:29.470759 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:29.471002 kubelet[1913]: W0212 19:48:29.470971 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:29.471113 kubelet[1913]: E0212 19:48:29.471099 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:29.475879 kubelet[1913]: E0212 19:48:29.475851 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:29.476122 kubelet[1913]: W0212 19:48:29.476088 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:29.476284 kubelet[1913]: E0212 19:48:29.476273 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:29.489019 kubelet[1913]: E0212 19:48:29.484631 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:29.489019 kubelet[1913]: W0212 19:48:29.484661 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:29.489019 kubelet[1913]: E0212 19:48:29.484688 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:29.489019 kubelet[1913]: E0212 19:48:29.484921 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:29.489019 kubelet[1913]: W0212 19:48:29.484929 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:29.489019 kubelet[1913]: E0212 19:48:29.484952 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:29.493706 kubelet[1913]: E0212 19:48:29.493682 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:29.493706 kubelet[1913]: W0212 19:48:29.493697 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:29.493844 kubelet[1913]: E0212 19:48:29.493718 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:29.666662 env[1333]: time="2024-02-12T19:48:29.666606823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r4x5z,Uid:0b4072d7-2a2a-4d54-8b81-50a56d2b1aff,Namespace:kube-system,Attempt:0,}" Feb 12 19:48:29.671163 env[1333]: time="2024-02-12T19:48:29.670927151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tkfn2,Uid:b04e4e2b-fb2e-478a-8e14-edb0e910c608,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:30.342309 kubelet[1913]: E0212 19:48:30.342261 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:30.797038 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount511024323.mount: Deactivated successfully. Feb 12 19:48:30.820667 env[1333]: time="2024-02-12T19:48:30.820616825Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.827949 env[1333]: time="2024-02-12T19:48:30.827910871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.840429 env[1333]: time="2024-02-12T19:48:30.840379251Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.846427 env[1333]: time="2024-02-12T19:48:30.846379189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.848954 env[1333]: time="2024-02-12T19:48:30.848916305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.852300 env[1333]: time="2024-02-12T19:48:30.852267626Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.854696 env[1333]: time="2024-02-12T19:48:30.854662942Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.859853 env[1333]: time="2024-02-12T19:48:30.859817974Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:30.914525 env[1333]: time="2024-02-12T19:48:30.914304121Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:30.914525 env[1333]: time="2024-02-12T19:48:30.914352122Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:30.914525 env[1333]: time="2024-02-12T19:48:30.914368322Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:30.914752 env[1333]: time="2024-02-12T19:48:30.914548623Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9652738a2cdbdf674d30f221ed64e53510fe0c0fb0cf78dce2798ae4cf89a50 pid=1962 runtime=io.containerd.runc.v2 Feb 12 19:48:30.931231 env[1333]: time="2024-02-12T19:48:30.931013228Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:48:30.931231 env[1333]: time="2024-02-12T19:48:30.931059928Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:48:30.931854 env[1333]: time="2024-02-12T19:48:30.931073728Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:48:30.932294 env[1333]: time="2024-02-12T19:48:30.932220935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03 pid=1982 runtime=io.containerd.runc.v2 Feb 12 19:48:30.935396 systemd[1]: Started cri-containerd-a9652738a2cdbdf674d30f221ed64e53510fe0c0fb0cf78dce2798ae4cf89a50.scope. Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.967129 kernel: audit: type=1400 audit(1707767310.952:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981137 kernel: audit: type=1400 audit(1707767310.952:565): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.990450 systemd[1]: Started cri-containerd-837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03.scope. Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.007114 kernel: audit: type=1400 audit(1707767310.952:566): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.008484 env[1333]: time="2024-02-12T19:48:31.008452620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-r4x5z,Uid:0b4072d7-2a2a-4d54-8b81-50a56d2b1aff,Namespace:kube-system,Attempt:0,} returns sandbox id \"a9652738a2cdbdf674d30f221ed64e53510fe0c0fb0cf78dce2798ae4cf89a50\"" Feb 12 19:48:31.010906 env[1333]: time="2024-02-12T19:48:31.010879335Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036101 kernel: audit: type=1400 audit(1707767310.952:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036237 kernel: audit: type=1400 audit(1707767310.952:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.979000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.979000 audit: BPF prog-id=68 op=LOAD Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00023dc48 a2=10 a3=1c items=0 ppid=1962 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139363532373338613263646264663637346433306632323165643634 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00023d6b0 a2=3c a3=c items=0 ppid=1962 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139363532373338613263646264663637346433306632323165643634 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit: BPF prog-id=69 op=LOAD Feb 12 19:48:30.980000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023d9d8 a2=78 a3=c0002cab70 items=0 ppid=1962 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139363532373338613263646264663637346433306632323165643634 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.980000 audit: BPF prog-id=70 op=LOAD Feb 12 19:48:30.980000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00023d770 a2=78 a3=c0002cabb8 items=0 ppid=1962 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139363532373338613263646264663637346433306632323165643634 Feb 12 19:48:30.981000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:48:30.981000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { perfmon } for pid=1973 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit[1973]: AVC avc: denied { bpf } for pid=1973 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:30.981000 audit: BPF prog-id=71 op=LOAD Feb 12 19:48:30.981000 audit[1973]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00023dc30 a2=78 a3=c0002cafc8 items=0 ppid=1962 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:30.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139363532373338613263646264663637346433306632323165643634 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.035000 audit: BPF prog-id=72 op=LOAD Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1982 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373830386430396632636639663930366564656562333331316138 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1982 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373830386430396632636639663930366564656562333331316138 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit: BPF prog-id=73 op=LOAD Feb 12 19:48:31.036000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038db90 items=0 ppid=1982 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373830386430396632636639663930366564656562333331316138 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit: BPF prog-id=74 op=LOAD Feb 12 19:48:31.036000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038dbd8 items=0 ppid=1982 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373830386430396632636639663930366564656562333331316138 Feb 12 19:48:31.036000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:48:31.036000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { perfmon } for pid=2001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit[2001]: AVC avc: denied { bpf } for pid=2001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:31.036000 audit: BPF prog-id=75 op=LOAD Feb 12 19:48:31.036000 audit[2001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038dfe8 items=0 ppid=1982 pid=2001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:31.036000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833373830386430396632636639663930366564656562333331316138 Feb 12 19:48:31.056128 env[1333]: time="2024-02-12T19:48:31.053301898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tkfn2,Uid:b04e4e2b-fb2e-478a-8e14-edb0e910c608,Namespace:calico-system,Attempt:0,} returns sandbox id \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\"" Feb 12 19:48:31.343018 kubelet[1913]: E0212 19:48:31.342894 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:31.395512 kubelet[1913]: E0212 19:48:31.395088 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:32.195537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount78703846.mount: Deactivated successfully. Feb 12 19:48:32.343948 kubelet[1913]: E0212 19:48:32.343843 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:32.788900 env[1333]: time="2024-02-12T19:48:32.788839250Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:32.800869 env[1333]: time="2024-02-12T19:48:32.800818822Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:32.807363 env[1333]: time="2024-02-12T19:48:32.807326362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:32.812037 env[1333]: time="2024-02-12T19:48:32.812002790Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:32.812367 env[1333]: time="2024-02-12T19:48:32.812335792Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:342a759d88156b4f56ba522a1aed0e3d32d72542545346b40877f6583bebe05f\"" Feb 12 19:48:32.813553 env[1333]: time="2024-02-12T19:48:32.813522299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:48:32.814599 env[1333]: time="2024-02-12T19:48:32.814567306Z" level=info msg="CreateContainer within sandbox \"a9652738a2cdbdf674d30f221ed64e53510fe0c0fb0cf78dce2798ae4cf89a50\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:48:32.857412 env[1333]: time="2024-02-12T19:48:32.857347465Z" level=info msg="CreateContainer within sandbox \"a9652738a2cdbdf674d30f221ed64e53510fe0c0fb0cf78dce2798ae4cf89a50\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f332cfbef190204d224538a9c7317ede58eae0d4eba8ffd13a71b055850f64aa\"" Feb 12 19:48:32.858206 env[1333]: time="2024-02-12T19:48:32.858155369Z" level=info msg="StartContainer for \"f332cfbef190204d224538a9c7317ede58eae0d4eba8ffd13a71b055850f64aa\"" Feb 12 19:48:32.882536 systemd[1]: Started cri-containerd-f332cfbef190204d224538a9c7317ede58eae0d4eba8ffd13a71b055850f64aa.scope. Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f8389cafec8 items=0 ppid=1962 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333263666265663139303230346432323435333861396337333137 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit: BPF prog-id=76 op=LOAD Feb 12 19:48:32.901000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00035a738 items=0 ppid=1962 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333263666265663139303230346432323435333861396337333137 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit: BPF prog-id=77 op=LOAD Feb 12 19:48:32.901000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00035a788 items=0 ppid=1962 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333263666265663139303230346432323435333861396337333137 Feb 12 19:48:32.901000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:48:32.901000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { perfmon } for pid=2047 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit[2047]: AVC avc: denied { bpf } for pid=2047 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:32.901000 audit: BPF prog-id=78 op=LOAD Feb 12 19:48:32.901000 audit[2047]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00035a818 items=0 ppid=1962 pid=2047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333263666265663139303230346432323435333861396337333137 Feb 12 19:48:32.922460 env[1333]: time="2024-02-12T19:48:32.922402158Z" level=info msg="StartContainer for \"f332cfbef190204d224538a9c7317ede58eae0d4eba8ffd13a71b055850f64aa\" returns successfully" Feb 12 19:48:32.974000 audit[2100]: NETFILTER_CFG table=mangle:18 family=2 entries=1 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:32.974000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde6522080 a2=0 a3=7ffde652206c items=0 ppid=2059 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:48:32.976000 audit[2101]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:32.976000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe659ca980 a2=0 a3=7ffe659ca96c items=0 ppid=2059 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:48:32.977000 audit[2102]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:32.977000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff0b19f590 a2=0 a3=7fff0b19f57c items=0 ppid=2059 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:48:32.979000 audit[2103]: NETFILTER_CFG table=mangle:21 family=10 entries=1 op=nft_register_chain pid=2103 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:32.979000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf9b44d90 a2=0 a3=7ffdf9b44d7c items=0 ppid=2059 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:48:32.981000 audit[2104]: NETFILTER_CFG table=nat:22 family=10 entries=1 op=nft_register_chain pid=2104 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:32.981000 audit[2104]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffef39b700 a2=0 a3=7fffef39b6ec items=0 ppid=2059 pid=2104 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.981000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:48:32.982000 audit[2105]: NETFILTER_CFG table=filter:23 family=10 entries=1 op=nft_register_chain pid=2105 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:32.982000 audit[2105]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffab9839d0 a2=0 a3=7fffab9839bc items=0 ppid=2059 pid=2105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:32.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:48:33.082000 audit[2106]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.082000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe37718ad0 a2=0 a3=7ffe37718abc items=0 ppid=2059 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:48:33.087000 audit[2108]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.087000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff4f93a1a0 a2=0 a3=7fff4f93a18c items=0 ppid=2059 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:48:33.090000 audit[2111]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.090000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffef2835540 a2=0 a3=7ffef283552c items=0 ppid=2059 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.090000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:48:33.092000 audit[2112]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2112 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.092000 audit[2112]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffce63f3c0 a2=0 a3=7fffce63f3ac items=0 ppid=2059 pid=2112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:48:33.094000 audit[2114]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.094000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1e967050 a2=0 a3=7ffd1e96703c items=0 ppid=2059 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:48:33.095000 audit[2115]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.095000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4fc4f840 a2=0 a3=7ffd4fc4f82c items=0 ppid=2059 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:48:33.098000 audit[2117]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2117 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.098000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe8d49b5a0 a2=0 a3=7ffe8d49b58c items=0 ppid=2059 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:48:33.101000 audit[2120]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2120 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.101000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4751d7d0 a2=0 a3=7ffd4751d7bc items=0 ppid=2059 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:48:33.102000 audit[2121]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.102000 audit[2121]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff7cf0aa00 a2=0 a3=7fff7cf0a9ec items=0 ppid=2059 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:48:33.105000 audit[2123]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2123 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.105000 audit[2123]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffa54feb40 a2=0 a3=7fffa54feb2c items=0 ppid=2059 pid=2123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:48:33.106000 audit[2124]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.106000 audit[2124]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeba93a9e0 a2=0 a3=7ffeba93a9cc items=0 ppid=2059 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:48:33.108000 audit[2126]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.108000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda66e2880 a2=0 a3=7ffda66e286c items=0 ppid=2059 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:33.112000 audit[2129]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2129 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.112000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcdd3394f0 a2=0 a3=7ffcdd3394dc items=0 ppid=2059 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:33.115000 audit[2132]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2132 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.115000 audit[2132]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffec9a18d10 a2=0 a3=7ffec9a18cfc items=0 ppid=2059 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.115000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:48:33.116000 audit[2133]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.116000 audit[2133]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe08712b0 a2=0 a3=7fffe087129c items=0 ppid=2059 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:48:33.119000 audit[2135]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.119000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8b00dd30 a2=0 a3=7fff8b00dd1c items=0 ppid=2059 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:33.151000 audit[2140]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.151000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffce400d070 a2=0 a3=7ffce400d05c items=0 ppid=2059 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:33.152000 audit[2141]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.152000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd87e783c0 a2=0 a3=7ffd87e783ac items=0 ppid=2059 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:48:33.155000 audit[2143]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:48:33.155000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc7d23c3f0 a2=0 a3=7ffc7d23c3dc items=0 ppid=2059 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:48:33.166000 audit[2149]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:33.166000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffe7e47ccc0 a2=0 a3=7ffe7e47ccac items=0 ppid=2059 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:33.206000 audit[2149]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:48:33.206000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=30372 a0=3 a1=7ffe7e47ccc0 a2=0 a3=7ffe7e47ccac items=0 ppid=2059 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.206000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:33.228000 audit[2158]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.228000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffbefa8b90 a2=0 a3=7fffbefa8b7c items=0 ppid=2059 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:48:33.231000 audit[2160]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.231000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffea18878a0 a2=0 a3=7ffea188788c items=0 ppid=2059 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:48:33.234000 audit[2163]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.234000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffd444ae70 a2=0 a3=7fffd444ae5c items=0 ppid=2059 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.234000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:48:33.236000 audit[2164]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.236000 audit[2164]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd161e14a0 a2=0 a3=7ffd161e148c items=0 ppid=2059 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.236000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:48:33.238000 audit[2166]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.238000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc2fcf3ef0 a2=0 a3=7ffc2fcf3edc items=0 ppid=2059 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:48:33.239000 audit[2167]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.239000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd31709f60 a2=0 a3=7ffd31709f4c items=0 ppid=2059 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:48:33.241000 audit[2169]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.241000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe525805a0 a2=0 a3=7ffe5258058c items=0 ppid=2059 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.241000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:48:33.245000 audit[2172]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.245000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffebc7d21b0 a2=0 a3=7ffebc7d219c items=0 ppid=2059 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:48:33.246000 audit[2173]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.246000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff8cfca50 a2=0 a3=7ffff8cfca3c items=0 ppid=2059 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.246000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:48:33.248000 audit[2175]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.248000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff28421e20 a2=0 a3=7fff28421e0c items=0 ppid=2059 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:48:33.249000 audit[2176]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.249000 audit[2176]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff700bc540 a2=0 a3=7fff700bc52c items=0 ppid=2059 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:48:33.252000 audit[2178]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.252000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff429e2d0 a2=0 a3=7ffff429e2bc items=0 ppid=2059 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:48:33.256000 audit[2181]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.256000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd17135a30 a2=0 a3=7ffd17135a1c items=0 ppid=2059 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.256000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:48:33.259000 audit[2184]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.259000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd02d0f980 a2=0 a3=7ffd02d0f96c items=0 ppid=2059 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.259000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:48:33.260000 audit[2185]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.260000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff94540140 a2=0 a3=7fff9454012c items=0 ppid=2059 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.260000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:48:33.262000 audit[2187]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.262000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffcb692e9a0 a2=0 a3=7ffcb692e98c items=0 ppid=2059 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.262000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:33.266000 audit[2190]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.266000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc6135f9e0 a2=0 a3=7ffc6135f9cc items=0 ppid=2059 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:48:33.267000 audit[2191]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.267000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe485186b0 a2=0 a3=7ffe4851869c items=0 ppid=2059 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:48:33.269000 audit[2193]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.269000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc22781d50 a2=0 a3=7ffc22781d3c items=0 ppid=2059 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.269000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:48:33.270000 audit[2194]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.270000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff300c40f0 a2=0 a3=7fff300c40dc items=0 ppid=2059 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:48:33.272000 audit[2196]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.272000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcef7eeba0 a2=0 a3=7ffcef7eeb8c items=0 ppid=2059 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:33.276000 audit[2199]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:48:33.276000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcfb0815f0 a2=0 a3=7ffcfb0815dc items=0 ppid=2059 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:48:33.278000 audit[2201]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:48:33.278000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffcad7b5780 a2=0 a3=7ffcad7b576c items=0 ppid=2059 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.278000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:33.279000 audit[2201]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:48:33.279000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffcad7b5780 a2=0 a3=7ffcad7b576c items=0 ppid=2059 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:33.279000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:48:33.345020 kubelet[1913]: E0212 19:48:33.344887 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:33.395384 kubelet[1913]: E0212 19:48:33.394926 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:33.422389 kubelet[1913]: I0212 19:48:33.422350 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-r4x5z" podStartSLOduration=3.61967706 podCreationTimestamp="2024-02-12 19:48:28 +0000 UTC" firstStartedPulling="2024-02-12 19:48:31.010232331 +0000 UTC m=+4.055685259" lastFinishedPulling="2024-02-12 19:48:32.812873295 +0000 UTC m=+5.858326323" observedRunningTime="2024-02-12 19:48:33.422116722 +0000 UTC m=+6.467569750" watchObservedRunningTime="2024-02-12 19:48:33.422318124 +0000 UTC m=+6.467771052" Feb 12 19:48:33.489363 kubelet[1913]: E0212 19:48:33.489321 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.489363 kubelet[1913]: W0212 19:48:33.489352 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.489626 kubelet[1913]: E0212 19:48:33.489382 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.489626 kubelet[1913]: E0212 19:48:33.489615 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.489788 kubelet[1913]: W0212 19:48:33.489627 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.489788 kubelet[1913]: E0212 19:48:33.489646 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.489893 kubelet[1913]: E0212 19:48:33.489848 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.489893 kubelet[1913]: W0212 19:48:33.489859 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.489893 kubelet[1913]: E0212 19:48:33.489877 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.490156 kubelet[1913]: E0212 19:48:33.490130 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.490215 kubelet[1913]: W0212 19:48:33.490162 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.490215 kubelet[1913]: E0212 19:48:33.490181 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.490473 kubelet[1913]: E0212 19:48:33.490453 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.490572 kubelet[1913]: W0212 19:48:33.490489 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.490572 kubelet[1913]: E0212 19:48:33.490510 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.490805 kubelet[1913]: E0212 19:48:33.490784 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.490805 kubelet[1913]: W0212 19:48:33.490798 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.490905 kubelet[1913]: E0212 19:48:33.490827 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.491070 kubelet[1913]: E0212 19:48:33.491042 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.491135 kubelet[1913]: W0212 19:48:33.491074 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.491135 kubelet[1913]: E0212 19:48:33.491091 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.491446 kubelet[1913]: E0212 19:48:33.491430 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.491446 kubelet[1913]: W0212 19:48:33.491442 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.491568 kubelet[1913]: E0212 19:48:33.491458 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.491749 kubelet[1913]: E0212 19:48:33.491731 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.491749 kubelet[1913]: W0212 19:48:33.491744 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.491878 kubelet[1913]: E0212 19:48:33.491761 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.492013 kubelet[1913]: E0212 19:48:33.491957 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.492013 kubelet[1913]: W0212 19:48:33.491968 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.492013 kubelet[1913]: E0212 19:48:33.491982 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.492182 kubelet[1913]: E0212 19:48:33.492164 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.492182 kubelet[1913]: W0212 19:48:33.492178 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.492315 kubelet[1913]: E0212 19:48:33.492194 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.492380 kubelet[1913]: E0212 19:48:33.492365 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.492425 kubelet[1913]: W0212 19:48:33.492381 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.492425 kubelet[1913]: E0212 19:48:33.492396 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.492595 kubelet[1913]: E0212 19:48:33.492579 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.492595 kubelet[1913]: W0212 19:48:33.492591 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.492698 kubelet[1913]: E0212 19:48:33.492616 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.492820 kubelet[1913]: E0212 19:48:33.492807 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.492820 kubelet[1913]: W0212 19:48:33.492818 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.492938 kubelet[1913]: E0212 19:48:33.492833 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.493048 kubelet[1913]: E0212 19:48:33.493031 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.493048 kubelet[1913]: W0212 19:48:33.493044 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.493161 kubelet[1913]: E0212 19:48:33.493061 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.493252 kubelet[1913]: E0212 19:48:33.493235 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.493252 kubelet[1913]: W0212 19:48:33.493248 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.493367 kubelet[1913]: E0212 19:48:33.493266 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.493451 kubelet[1913]: E0212 19:48:33.493437 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.493451 kubelet[1913]: W0212 19:48:33.493448 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.493560 kubelet[1913]: E0212 19:48:33.493465 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.493640 kubelet[1913]: E0212 19:48:33.493624 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.493640 kubelet[1913]: W0212 19:48:33.493636 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.493759 kubelet[1913]: E0212 19:48:33.493650 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.493821 kubelet[1913]: E0212 19:48:33.493807 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.493871 kubelet[1913]: W0212 19:48:33.493820 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.493871 kubelet[1913]: E0212 19:48:33.493834 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.494023 kubelet[1913]: E0212 19:48:33.494007 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.494023 kubelet[1913]: W0212 19:48:33.494022 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.494113 kubelet[1913]: E0212 19:48:33.494037 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.499338 kubelet[1913]: E0212 19:48:33.499319 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.499338 kubelet[1913]: W0212 19:48:33.499333 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.499450 kubelet[1913]: E0212 19:48:33.499349 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.499602 kubelet[1913]: E0212 19:48:33.499589 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.499682 kubelet[1913]: W0212 19:48:33.499663 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.499735 kubelet[1913]: E0212 19:48:33.499688 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.499928 kubelet[1913]: E0212 19:48:33.499913 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.499928 kubelet[1913]: W0212 19:48:33.499925 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.500079 kubelet[1913]: E0212 19:48:33.499945 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.500190 kubelet[1913]: E0212 19:48:33.500174 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.500190 kubelet[1913]: W0212 19:48:33.500186 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.500316 kubelet[1913]: E0212 19:48:33.500206 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.500424 kubelet[1913]: E0212 19:48:33.500409 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.500424 kubelet[1913]: W0212 19:48:33.500420 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.500519 kubelet[1913]: E0212 19:48:33.500441 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.500687 kubelet[1913]: E0212 19:48:33.500672 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.500687 kubelet[1913]: W0212 19:48:33.500684 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.500849 kubelet[1913]: E0212 19:48:33.500835 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.500986 kubelet[1913]: E0212 19:48:33.500856 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.501057 kubelet[1913]: W0212 19:48:33.500997 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.501057 kubelet[1913]: E0212 19:48:33.501014 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.501217 kubelet[1913]: E0212 19:48:33.501201 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.501286 kubelet[1913]: W0212 19:48:33.501217 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.501286 kubelet[1913]: E0212 19:48:33.501232 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.501405 kubelet[1913]: E0212 19:48:33.501389 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.501450 kubelet[1913]: W0212 19:48:33.501406 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.501450 kubelet[1913]: E0212 19:48:33.501420 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.501632 kubelet[1913]: E0212 19:48:33.501612 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.501632 kubelet[1913]: W0212 19:48:33.501626 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.501734 kubelet[1913]: E0212 19:48:33.501648 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.502016 kubelet[1913]: E0212 19:48:33.502000 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.502016 kubelet[1913]: W0212 19:48:33.502013 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.502122 kubelet[1913]: E0212 19:48:33.502036 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:33.502241 kubelet[1913]: E0212 19:48:33.502227 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:33.502241 kubelet[1913]: W0212 19:48:33.502239 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:33.502319 kubelet[1913]: E0212 19:48:33.502253 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.345524 kubelet[1913]: E0212 19:48:34.345460 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:34.502270 kubelet[1913]: E0212 19:48:34.502237 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.502270 kubelet[1913]: W0212 19:48:34.502259 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.502270 kubelet[1913]: E0212 19:48:34.502286 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.502631 kubelet[1913]: E0212 19:48:34.502507 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.502631 kubelet[1913]: W0212 19:48:34.502517 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.502631 kubelet[1913]: E0212 19:48:34.502533 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.502755 kubelet[1913]: E0212 19:48:34.502697 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.502755 kubelet[1913]: W0212 19:48:34.502706 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.502755 kubelet[1913]: E0212 19:48:34.502720 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.502897 kubelet[1913]: E0212 19:48:34.502884 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.502897 kubelet[1913]: W0212 19:48:34.502892 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.502980 kubelet[1913]: E0212 19:48:34.502906 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.503127 kubelet[1913]: E0212 19:48:34.503114 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.503183 kubelet[1913]: W0212 19:48:34.503128 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.503183 kubelet[1913]: E0212 19:48:34.503144 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.503331 kubelet[1913]: E0212 19:48:34.503313 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.503331 kubelet[1913]: W0212 19:48:34.503327 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.503454 kubelet[1913]: E0212 19:48:34.503342 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.503529 kubelet[1913]: E0212 19:48:34.503512 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.503529 kubelet[1913]: W0212 19:48:34.503525 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.503640 kubelet[1913]: E0212 19:48:34.503540 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.503738 kubelet[1913]: E0212 19:48:34.503724 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.503738 kubelet[1913]: W0212 19:48:34.503735 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.503856 kubelet[1913]: E0212 19:48:34.503751 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.503939 kubelet[1913]: E0212 19:48:34.503922 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.503939 kubelet[1913]: W0212 19:48:34.503935 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504056 kubelet[1913]: E0212 19:48:34.503952 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.504146 kubelet[1913]: E0212 19:48:34.504129 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.504146 kubelet[1913]: W0212 19:48:34.504142 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504258 kubelet[1913]: E0212 19:48:34.504158 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.504334 kubelet[1913]: E0212 19:48:34.504318 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.504334 kubelet[1913]: W0212 19:48:34.504330 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504504 kubelet[1913]: E0212 19:48:34.504344 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.504562 kubelet[1913]: E0212 19:48:34.504503 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.504562 kubelet[1913]: W0212 19:48:34.504512 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504562 kubelet[1913]: E0212 19:48:34.504529 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.504708 kubelet[1913]: E0212 19:48:34.504694 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.504708 kubelet[1913]: W0212 19:48:34.504705 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504835 kubelet[1913]: E0212 19:48:34.504724 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.504885 kubelet[1913]: E0212 19:48:34.504879 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.504927 kubelet[1913]: W0212 19:48:34.504888 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.504927 kubelet[1913]: E0212 19:48:34.504902 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.505091 kubelet[1913]: E0212 19:48:34.505079 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.505091 kubelet[1913]: W0212 19:48:34.505092 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.505214 kubelet[1913]: E0212 19:48:34.505107 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.505280 kubelet[1913]: E0212 19:48:34.505265 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.505280 kubelet[1913]: W0212 19:48:34.505276 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.505383 kubelet[1913]: E0212 19:48:34.505291 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.505472 kubelet[1913]: E0212 19:48:34.505460 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.505534 kubelet[1913]: W0212 19:48:34.505472 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.505534 kubelet[1913]: E0212 19:48:34.505487 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.505660 kubelet[1913]: E0212 19:48:34.505647 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.505708 kubelet[1913]: W0212 19:48:34.505664 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.505708 kubelet[1913]: E0212 19:48:34.505679 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.505854 kubelet[1913]: E0212 19:48:34.505841 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.505920 kubelet[1913]: W0212 19:48:34.505855 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.505920 kubelet[1913]: E0212 19:48:34.505870 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.506121 kubelet[1913]: E0212 19:48:34.506108 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.506196 kubelet[1913]: W0212 19:48:34.506122 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.506196 kubelet[1913]: E0212 19:48:34.506139 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.506400 kubelet[1913]: E0212 19:48:34.506388 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.506463 kubelet[1913]: W0212 19:48:34.506401 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.506463 kubelet[1913]: E0212 19:48:34.506416 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.506638 kubelet[1913]: E0212 19:48:34.506617 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.506638 kubelet[1913]: W0212 19:48:34.506628 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.506776 kubelet[1913]: E0212 19:48:34.506647 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.506860 kubelet[1913]: E0212 19:48:34.506847 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.506912 kubelet[1913]: W0212 19:48:34.506862 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.506912 kubelet[1913]: E0212 19:48:34.506882 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.507083 kubelet[1913]: E0212 19:48:34.507070 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.507133 kubelet[1913]: W0212 19:48:34.507084 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.507133 kubelet[1913]: E0212 19:48:34.507103 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.507275 kubelet[1913]: E0212 19:48:34.507268 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.507316 kubelet[1913]: W0212 19:48:34.507278 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.507316 kubelet[1913]: E0212 19:48:34.507293 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.507727 kubelet[1913]: E0212 19:48:34.507473 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.507727 kubelet[1913]: W0212 19:48:34.507484 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.507727 kubelet[1913]: E0212 19:48:34.507498 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.507901 kubelet[1913]: E0212 19:48:34.507760 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.507901 kubelet[1913]: W0212 19:48:34.507770 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.507901 kubelet[1913]: E0212 19:48:34.507791 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.508347 kubelet[1913]: E0212 19:48:34.508080 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.508347 kubelet[1913]: W0212 19:48:34.508094 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.508347 kubelet[1913]: E0212 19:48:34.508114 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.508347 kubelet[1913]: E0212 19:48:34.508304 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.508347 kubelet[1913]: W0212 19:48:34.508313 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.508347 kubelet[1913]: E0212 19:48:34.508331 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.508621 kubelet[1913]: E0212 19:48:34.508544 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.508621 kubelet[1913]: W0212 19:48:34.508553 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.508621 kubelet[1913]: E0212 19:48:34.508573 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.509402 kubelet[1913]: E0212 19:48:34.508949 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.509402 kubelet[1913]: W0212 19:48:34.508962 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.509402 kubelet[1913]: E0212 19:48:34.509071 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:34.509402 kubelet[1913]: E0212 19:48:34.509233 1913 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:48:34.509402 kubelet[1913]: W0212 19:48:34.509242 1913 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:48:34.509748 kubelet[1913]: E0212 19:48:34.509732 1913 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:48:35.346570 kubelet[1913]: E0212 19:48:35.346528 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:35.396030 kubelet[1913]: E0212 19:48:35.394962 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:36.225846 env[1333]: time="2024-02-12T19:48:36.225790252Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:36.235758 env[1333]: time="2024-02-12T19:48:36.235714406Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:36.243701 env[1333]: time="2024-02-12T19:48:36.243657850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:36.249381 env[1333]: time="2024-02-12T19:48:36.249341781Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:36.250161 env[1333]: time="2024-02-12T19:48:36.250120785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:48:36.252525 env[1333]: time="2024-02-12T19:48:36.252491298Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:48:36.277222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1889310651.mount: Deactivated successfully. Feb 12 19:48:36.293287 env[1333]: time="2024-02-12T19:48:36.293232922Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5\"" Feb 12 19:48:36.294035 env[1333]: time="2024-02-12T19:48:36.293983226Z" level=info msg="StartContainer for \"d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5\"" Feb 12 19:48:36.322169 systemd[1]: Started cri-containerd-d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5.scope. Feb 12 19:48:36.358409 kernel: kauditd_printk_skb: 307 callbacks suppressed Feb 12 19:48:36.358576 kernel: audit: type=1400 audit(1707767316.337:656): avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.358966 kubelet[1913]: E0212 19:48:36.358907 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:36.337000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f5a280c2cb8 items=0 ppid=1982 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.378142 env[1333]: time="2024-02-12T19:48:36.378098287Z" level=info msg="StartContainer for \"d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5\" returns successfully" Feb 12 19:48:36.379009 kernel: audit: type=1300 audit(1707767316.337:656): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f5a280c2cb8 items=0 ppid=1982 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.379076 kernel: audit: type=1327 audit(1707767316.337:656): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393730316336396136653764313337373334326365393536336135 Feb 12 19:48:36.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393730316336396136653764313337373334326365393536336135 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.424526 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.424660 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.424722 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.442058 systemd[1]: cri-containerd-d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5.scope: Deactivated successfully. Feb 12 19:48:36.449534 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.462113 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.488759 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.538940 kernel: audit: type=1400 audit(1707767316.337:657): avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.337000 audit: BPF prog-id=79 op=LOAD Feb 12 19:48:36.337000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b50e8 items=0 ppid=1982 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393730316336396136653764313337373334326365393536336135 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit: BPF prog-id=80 op=LOAD Feb 12 19:48:36.357000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b5138 items=0 ppid=1982 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393730316336396136653764313337373334326365393536336135 Feb 12 19:48:36.357000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:48:36.357000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { perfmon } for pid=2274 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit[2274]: AVC avc: denied { bpf } for pid=2274 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:36.357000 audit: BPF prog-id=81 op=LOAD Feb 12 19:48:36.357000 audit[2274]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b51c8 items=0 ppid=1982 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:36.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439393730316336396136653764313337373334326365393536336135 Feb 12 19:48:36.488000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:48:37.274739 systemd[1]: run-containerd-runc-k8s.io-d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5-runc.HAHmWP.mount: Deactivated successfully. Feb 12 19:48:37.274880 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5-rootfs.mount: Deactivated successfully. Feb 12 19:48:37.315709 env[1333]: time="2024-02-12T19:48:37.315643288Z" level=info msg="shim disconnected" id=d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5 Feb 12 19:48:37.315709 env[1333]: time="2024-02-12T19:48:37.315709688Z" level=warning msg="cleaning up after shim disconnected" id=d99701c69a6e7d1377342ce9563a57700930e271246ce26e42206ee5d23d1ef5 namespace=k8s.io Feb 12 19:48:37.316335 env[1333]: time="2024-02-12T19:48:37.315724888Z" level=info msg="cleaning up dead shim" Feb 12 19:48:37.324307 env[1333]: time="2024-02-12T19:48:37.324265734Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2322 runtime=io.containerd.runc.v2\n" Feb 12 19:48:37.359375 kubelet[1913]: E0212 19:48:37.359338 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:37.395460 kubelet[1913]: E0212 19:48:37.394968 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:37.430573 env[1333]: time="2024-02-12T19:48:37.430521803Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:48:38.359720 kubelet[1913]: E0212 19:48:38.359678 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:39.356079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4170637442.mount: Deactivated successfully. Feb 12 19:48:39.360480 kubelet[1913]: E0212 19:48:39.360441 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:39.395861 kubelet[1913]: E0212 19:48:39.395191 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:40.361022 kubelet[1913]: E0212 19:48:40.360957 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:41.361860 kubelet[1913]: E0212 19:48:41.361802 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:41.395288 kubelet[1913]: E0212 19:48:41.395249 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:42.362369 kubelet[1913]: E0212 19:48:42.362313 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:43.131075 env[1333]: time="2024-02-12T19:48:43.131020191Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:43.135826 env[1333]: time="2024-02-12T19:48:43.135785313Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:43.138769 env[1333]: time="2024-02-12T19:48:43.138730926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:43.143432 env[1333]: time="2024-02-12T19:48:43.143397548Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:43.144096 env[1333]: time="2024-02-12T19:48:43.144065651Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:48:43.146243 env[1333]: time="2024-02-12T19:48:43.146208661Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:48:43.207537 env[1333]: time="2024-02-12T19:48:43.207475946Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98\"" Feb 12 19:48:43.208106 env[1333]: time="2024-02-12T19:48:43.208024648Z" level=info msg="StartContainer for \"5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98\"" Feb 12 19:48:43.230757 systemd[1]: Started cri-containerd-5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98.scope. Feb 12 19:48:43.266014 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:48:43.266155 kernel: audit: type=1400 audit(1707767323.245:663): avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc12c333898 items=0 ppid=1982 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.304722 kernel: audit: type=1300 audit(1707767323.245:663): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fc12c333898 items=0 ppid=1982 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.304945 kernel: audit: type=1327 audit(1707767323.245:663): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353039616433393439303139336430636437616462353234303537 Feb 12 19:48:43.304979 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353039616433393439303139336430636437616462353234303537 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.340429 env[1333]: time="2024-02-12T19:48:43.340386763Z" level=info msg="StartContainer for \"5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98\" returns successfully" Feb 12 19:48:43.347283 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.347426 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.347455 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.363061 kubelet[1913]: E0212 19:48:43.363010 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:43.373191 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.373312 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.387565 kernel: audit: type=1400 audit(1707767323.245:664): avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.396866 kubelet[1913]: E0212 19:48:43.396322 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.245000 audit: BPF prog-id=82 op=LOAD Feb 12 19:48:43.245000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000390228 items=0 ppid=1982 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353039616433393439303139336430636437616462353234303537 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.251000 audit: BPF prog-id=83 op=LOAD Feb 12 19:48:43.251000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000390278 items=0 ppid=1982 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353039616433393439303139336430636437616462353234303537 Feb 12 19:48:43.265000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:48:43.265000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { perfmon } for pid=2342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit[2342]: AVC avc: denied { bpf } for pid=2342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:43.265000 audit: BPF prog-id=84 op=LOAD Feb 12 19:48:43.265000 audit[2342]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000390308 items=0 ppid=1982 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:43.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566353039616433393439303139336430636437616462353234303537 Feb 12 19:48:44.364065 kubelet[1913]: E0212 19:48:44.363986 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:45.080807 systemd[1]: cri-containerd-5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98.scope: Deactivated successfully. Feb 12 19:48:45.083000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:48:45.100774 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98-rootfs.mount: Deactivated successfully. Feb 12 19:48:45.154538 kubelet[1913]: I0212 19:48:45.154253 1913 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:48:45.639595 kubelet[1913]: E0212 19:48:45.364900 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:45.401485 systemd[1]: Created slice kubepods-besteffort-pode5c3e20a_a07c_417a_ab09_4d550ade8b72.slice. Feb 12 19:48:45.640854 env[1333]: time="2024-02-12T19:48:45.640811913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-687cb,Uid:e5c3e20a-a07c-417a-ab09-4d550ade8b72,Namespace:calico-system,Attempt:0,}" Feb 12 19:48:46.366144 kubelet[1913]: E0212 19:48:46.366089 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:46.766333 env[1333]: time="2024-02-12T19:48:46.766261235Z" level=info msg="shim disconnected" id=5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98 Feb 12 19:48:46.766333 env[1333]: time="2024-02-12T19:48:46.766327535Z" level=warning msg="cleaning up after shim disconnected" id=5f509ad39490193d0cd7adb52405706079b4f46ffbd2b1143a68dbc04aa84a98 namespace=k8s.io Feb 12 19:48:46.766333 env[1333]: time="2024-02-12T19:48:46.766341735Z" level=info msg="cleaning up dead shim" Feb 12 19:48:46.782809 env[1333]: time="2024-02-12T19:48:46.782765407Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:48:46Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2390 runtime=io.containerd.runc.v2\n" Feb 12 19:48:46.828481 env[1333]: time="2024-02-12T19:48:46.828410005Z" level=error msg="Failed to destroy network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:46.830622 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c-shm.mount: Deactivated successfully. Feb 12 19:48:46.832348 env[1333]: time="2024-02-12T19:48:46.832278422Z" level=error msg="encountered an error cleaning up failed sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:46.832781 env[1333]: time="2024-02-12T19:48:46.832527123Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-687cb,Uid:e5c3e20a-a07c-417a-ab09-4d550ade8b72,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:46.834911 kubelet[1913]: E0212 19:48:46.834429 1913 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:46.834911 kubelet[1913]: E0212 19:48:46.834506 1913 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:46.834911 kubelet[1913]: E0212 19:48:46.834532 1913 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-687cb" Feb 12 19:48:46.835439 kubelet[1913]: E0212 19:48:46.834612 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-687cb_calico-system(e5c3e20a-a07c-417a-ab09-4d550ade8b72)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-687cb_calico-system(e5c3e20a-a07c-417a-ab09-4d550ade8b72)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:47.337012 kubelet[1913]: E0212 19:48:47.336933 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:47.367267 kubelet[1913]: E0212 19:48:47.367206 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:47.452402 env[1333]: time="2024-02-12T19:48:47.452352770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:48:47.452926 kubelet[1913]: I0212 19:48:47.452889 1913 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:48:47.453549 env[1333]: time="2024-02-12T19:48:47.453509775Z" level=info msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" Feb 12 19:48:47.478246 env[1333]: time="2024-02-12T19:48:47.478184380Z" level=error msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" failed" error="failed to destroy network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:47.478481 kubelet[1913]: E0212 19:48:47.478457 1913 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:48:47.478582 kubelet[1913]: E0212 19:48:47.478538 1913 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c"} Feb 12 19:48:47.478630 kubelet[1913]: E0212 19:48:47.478584 1913 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:47.478720 kubelet[1913]: E0212 19:48:47.478631 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e5c3e20a-a07c-417a-ab09-4d550ade8b72\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-687cb" podUID="e5c3e20a-a07c-417a-ab09-4d550ade8b72" Feb 12 19:48:48.367804 kubelet[1913]: E0212 19:48:48.367749 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:49.368985 kubelet[1913]: E0212 19:48:49.368828 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:50.369664 kubelet[1913]: E0212 19:48:50.369605 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:50.839833 kubelet[1913]: I0212 19:48:50.839043 1913 topology_manager.go:215] "Topology Admit Handler" podUID="b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e" podNamespace="default" podName="nginx-deployment-6d5f899847-tfb96" Feb 12 19:48:50.845751 systemd[1]: Created slice kubepods-besteffort-podb2afb2c4_26bf_4c5b_aa79_1ed038c2f15e.slice. Feb 12 19:48:50.944043 kubelet[1913]: I0212 19:48:50.943954 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sptpz\" (UniqueName: \"kubernetes.io/projected/b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e-kube-api-access-sptpz\") pod \"nginx-deployment-6d5f899847-tfb96\" (UID: \"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e\") " pod="default/nginx-deployment-6d5f899847-tfb96" Feb 12 19:48:51.150742 env[1333]: time="2024-02-12T19:48:51.150696272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-tfb96,Uid:b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e,Namespace:default,Attempt:0,}" Feb 12 19:48:51.289873 env[1333]: time="2024-02-12T19:48:51.289809014Z" level=error msg="Failed to destroy network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:51.292228 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e-shm.mount: Deactivated successfully. Feb 12 19:48:51.293688 env[1333]: time="2024-02-12T19:48:51.293638328Z" level=error msg="encountered an error cleaning up failed sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:51.293856 env[1333]: time="2024-02-12T19:48:51.293825329Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-tfb96,Uid:b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:51.294632 kubelet[1913]: E0212 19:48:51.294214 1913 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:51.294632 kubelet[1913]: E0212 19:48:51.294276 1913 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-tfb96" Feb 12 19:48:51.294632 kubelet[1913]: E0212 19:48:51.294304 1913 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-tfb96" Feb 12 19:48:51.294856 kubelet[1913]: E0212 19:48:51.294376 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-tfb96_default(b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-tfb96_default(b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-tfb96" podUID="b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e" Feb 12 19:48:51.370401 kubelet[1913]: E0212 19:48:51.370329 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:51.470742 kubelet[1913]: I0212 19:48:51.469773 1913 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:48:51.471484 env[1333]: time="2024-02-12T19:48:51.471446420Z" level=info msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" Feb 12 19:48:51.525056 env[1333]: time="2024-02-12T19:48:51.524977629Z" level=error msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" failed" error="failed to destroy network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:48:51.525669 kubelet[1913]: E0212 19:48:51.525486 1913 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:48:51.525669 kubelet[1913]: E0212 19:48:51.525537 1913 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e"} Feb 12 19:48:51.525669 kubelet[1913]: E0212 19:48:51.525585 1913 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:48:51.525669 kubelet[1913]: E0212 19:48:51.525621 1913 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-tfb96" podUID="b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e" Feb 12 19:48:52.370702 kubelet[1913]: E0212 19:48:52.370659 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:53.371789 kubelet[1913]: E0212 19:48:53.371726 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:53.903444 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount827629915.mount: Deactivated successfully. Feb 12 19:48:54.047737 env[1333]: time="2024-02-12T19:48:54.047672090Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:54.056530 env[1333]: time="2024-02-12T19:48:54.056484622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:54.060517 env[1333]: time="2024-02-12T19:48:54.060477337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:54.067774 env[1333]: time="2024-02-12T19:48:54.067731163Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:48:54.068211 env[1333]: time="2024-02-12T19:48:54.068175065Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:48:54.082646 env[1333]: time="2024-02-12T19:48:54.081157512Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:48:54.121337 env[1333]: time="2024-02-12T19:48:54.121281159Z" level=info msg="CreateContainer within sandbox \"837808d09f2cf9f906edeeb3311a84c2060a80d03a7bd39c76f6bc9773e92f03\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f\"" Feb 12 19:48:54.121905 env[1333]: time="2024-02-12T19:48:54.121873761Z" level=info msg="StartContainer for \"08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f\"" Feb 12 19:48:54.140260 systemd[1]: Started cri-containerd-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f.scope. Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.164389 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:48:54.164498 kernel: audit: type=1400 audit(1707767334.158:670): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fef58139ac8 items=0 ppid=1982 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.197490 kernel: audit: type=1300 audit(1707767334.158:670): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7fef58139ac8 items=0 ppid=1982 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.197600 kernel: audit: type=1327 audit(1707767334.158:670): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626537383530363037363931316662353064626236383430613863 Feb 12 19:48:54.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626537383530363037363931316662353064626236383430613863 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.230651 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.230773 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.245011 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.258039 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.270111 env[1333]: time="2024-02-12T19:48:54.270056302Z" level=info msg="StartContainer for \"08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f\" returns successfully" Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.297488 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.297641 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.297672 kernel: audit: type=1400 audit(1707767334.158:671): avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.158000 audit: BPF prog-id=85 op=LOAD Feb 12 19:48:54.158000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c00034dba8 items=0 ppid=1982 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626537383530363037363931316662353064626236383430613863 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.176000 audit: BPF prog-id=86 op=LOAD Feb 12 19:48:54.176000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c00034dbf8 items=0 ppid=1982 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626537383530363037363931316662353064626236383430613863 Feb 12 19:48:54.216000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:48:54.216000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { perfmon } for pid=2521 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit[2521]: AVC avc: denied { bpf } for pid=2521 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:54.216000 audit: BPF prog-id=87 op=LOAD Feb 12 19:48:54.216000 audit[2521]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00034dc88 items=0 ppid=1982 pid=2521 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:54.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626537383530363037363931316662353064626236383430613863 Feb 12 19:48:54.372859 kubelet[1913]: E0212 19:48:54.372811 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:54.490249 kubelet[1913]: I0212 19:48:54.490137 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-tkfn2" podStartSLOduration=3.479049964 podCreationTimestamp="2024-02-12 19:48:28 +0000 UTC" firstStartedPulling="2024-02-12 19:48:31.057442224 +0000 UTC m=+4.102895152" lastFinishedPulling="2024-02-12 19:48:54.068497066 +0000 UTC m=+27.113950094" observedRunningTime="2024-02-12 19:48:54.490028206 +0000 UTC m=+27.535481234" watchObservedRunningTime="2024-02-12 19:48:54.490104906 +0000 UTC m=+27.535557934" Feb 12 19:48:54.540382 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:48:54.540534 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:48:55.373527 kubelet[1913]: E0212 19:48:55.373466 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:55.499549 systemd[1]: run-containerd-runc-k8s.io-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f-runc.v5mFIE.mount: Deactivated successfully. Feb 12 19:48:55.777000 audit[2658]: AVC avc: denied { write } for pid=2658 comm="tee" name="fd" dev="proc" ino=22977 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.779000 audit[2661]: AVC avc: denied { write } for pid=2661 comm="tee" name="fd" dev="proc" ino=22980 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.777000 audit[2658]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe5b99e986 a2=241 a3=1b6 items=1 ppid=2628 pid=2658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.777000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:48:55.777000 audit: PATH item=0 name="/dev/fd/63" inode=22968 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.777000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.779000 audit[2661]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf4f9f986 a2=241 a3=1b6 items=1 ppid=2631 pid=2661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.779000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:48:55.779000 audit: PATH item=0 name="/dev/fd/63" inode=22971 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.779000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.791000 audit[2656]: AVC avc: denied { write } for pid=2656 comm="tee" name="fd" dev="proc" ino=22990 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.791000 audit[2656]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd0ba46977 a2=241 a3=1b6 items=1 ppid=2630 pid=2656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.791000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:48:55.791000 audit: PATH item=0 name="/dev/fd/63" inode=23829 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.791000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.798000 audit[2679]: AVC avc: denied { write } for pid=2679 comm="tee" name="fd" dev="proc" ino=23000 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.801000 audit[2671]: AVC avc: denied { write } for pid=2671 comm="tee" name="fd" dev="proc" ino=23003 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.798000 audit[2679]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcbc4f1986 a2=241 a3=1b6 items=1 ppid=2626 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.798000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:48:55.798000 audit: PATH item=0 name="/dev/fd/63" inode=22987 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.798000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.801000 audit[2671]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe15efa987 a2=241 a3=1b6 items=1 ppid=2636 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.801000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:48:55.801000 audit: PATH item=0 name="/dev/fd/63" inode=23842 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.801000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.805000 audit[2682]: AVC avc: denied { write } for pid=2682 comm="tee" name="fd" dev="proc" ino=23854 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.805000 audit[2682]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1b448976 a2=241 a3=1b6 items=1 ppid=2639 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.809000 audit[2688]: AVC avc: denied { write } for pid=2688 comm="tee" name="fd" dev="proc" ino=23008 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:48:55.809000 audit[2688]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd42791988 a2=241 a3=1b6 items=1 ppid=2634 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:55.809000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:48:55.809000 audit: PATH item=0 name="/dev/fd/63" inode=22997 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.809000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:55.805000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:48:55.805000 audit: PATH item=0 name="/dev/fd/63" inode=23845 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:48:55.805000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:48:56.021022 kernel: Initializing XFRM netlink socket Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit: BPF prog-id=88 op=LOAD Feb 12 19:48:56.208000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc3c680c0 a2=70 a3=7f388ba25000 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.208000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.208000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit: BPF prog-id=89 op=LOAD Feb 12 19:48:56.208000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffcc3c680c0 a2=70 a3=6e items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.208000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.208000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffcc3c68070 a2=70 a3=7ffcc3c680c0 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.208000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit: BPF prog-id=90 op=LOAD Feb 12 19:48:56.208000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcc3c68050 a2=70 a3=7ffcc3c680c0 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.208000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.208000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:48:56.208000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.208000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc3c68130 a2=70 a3=0 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.208000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffcc3c68120 a2=70 a3=0 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.209000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7ffcc3c68160 a2=70 a3=0 items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.209000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { perfmon } for pid=2765 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit[2765]: AVC avc: denied { bpf } for pid=2765 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.209000 audit: BPF prog-id=91 op=LOAD Feb 12 19:48:56.209000 audit[2765]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffcc3c68080 a2=70 a3=ffffffff items=0 ppid=2633 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.209000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:48:56.219000 audit[2767]: AVC avc: denied { bpf } for pid=2767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.219000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe020fea0 a2=70 a3=fff80800 items=0 ppid=2633 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:56.219000 audit[2767]: AVC avc: denied { bpf } for pid=2767 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:48:56.219000 audit[2767]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffe020fd70 a2=70 a3=3 items=0 ppid=2633 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.219000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:48:56.226000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:48:56.344000 audit[2790]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:56.344000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7fffb9a85970 a2=0 a3=7fffb9a8595c items=0 ppid=2633 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.344000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:56.351000 audit[2791]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:56.351000 audit[2791]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7ffcdbf3a490 a2=0 a3=558e64cd6000 items=0 ppid=2633 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.351000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:56.354000 audit[2793]: NETFILTER_CFG table=nat:71 family=2 entries=16 op=nft_register_chain pid=2793 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:56.354000 audit[2793]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffe6d32ab50 a2=0 a3=55aeb64e2000 items=0 ppid=2633 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:56.355000 audit[2794]: NETFILTER_CFG table=raw:72 family=2 entries=19 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:48:56.355000 audit[2794]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7fffe7110ae0 a2=0 a3=55e97eed0000 items=0 ppid=2633 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:48:56.355000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:48:56.374555 kubelet[1913]: E0212 19:48:56.374520 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:57.047415 systemd-networkd[1470]: vxlan.calico: Link UP Feb 12 19:48:57.047426 systemd-networkd[1470]: vxlan.calico: Gained carrier Feb 12 19:48:57.374725 kubelet[1913]: E0212 19:48:57.374606 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:58.375055 kubelet[1913]: E0212 19:48:58.374986 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:48:58.718272 systemd-networkd[1470]: vxlan.calico: Gained IPv6LL Feb 12 19:48:59.375914 kubelet[1913]: E0212 19:48:59.375815 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:00.376890 kubelet[1913]: E0212 19:49:00.376853 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:01.377594 kubelet[1913]: E0212 19:49:01.377536 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:01.396399 env[1333]: time="2024-02-12T19:49:01.396090071Z" level=info msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.437 [INFO][2828] k8s.go 578: Cleaning up netns ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.437 [INFO][2828] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" iface="eth0" netns="/var/run/netns/cni-805d28f6-cdb3-60ca-2971-b01a5c0dc11d" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.437 [INFO][2828] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" iface="eth0" netns="/var/run/netns/cni-805d28f6-cdb3-60ca-2971-b01a5c0dc11d" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.437 [INFO][2828] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" iface="eth0" netns="/var/run/netns/cni-805d28f6-cdb3-60ca-2971-b01a5c0dc11d" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.438 [INFO][2828] k8s.go 585: Releasing IP address(es) ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.438 [INFO][2828] utils.go 188: Calico CNI releasing IP address ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.455 [INFO][2834] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.455 [INFO][2834] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.455 [INFO][2834] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.461 [WARNING][2834] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.461 [INFO][2834] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.463 [INFO][2834] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:01.465015 env[1333]: 2024-02-12 19:49:01.464 [INFO][2828] k8s.go 591: Teardown processing complete. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:01.467695 systemd[1]: run-netns-cni\x2d805d28f6\x2dcdb3\x2d60ca\x2d2971\x2db01a5c0dc11d.mount: Deactivated successfully. Feb 12 19:49:01.468764 env[1333]: time="2024-02-12T19:49:01.468719502Z" level=info msg="TearDown network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" successfully" Feb 12 19:49:01.468854 env[1333]: time="2024-02-12T19:49:01.468760802Z" level=info msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" returns successfully" Feb 12 19:49:01.469594 env[1333]: time="2024-02-12T19:49:01.469527304Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-687cb,Uid:e5c3e20a-a07c-417a-ab09-4d550ade8b72,Namespace:calico-system,Attempt:1,}" Feb 12 19:49:01.617695 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:01.617827 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie960cc0d9ee: link becomes ready Feb 12 19:49:01.608221 systemd-networkd[1470]: calie960cc0d9ee: Link UP Feb 12 19:49:01.618343 systemd-networkd[1470]: calie960cc0d9ee: Gained carrier Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.549 [INFO][2841] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-csi--node--driver--687cb-eth0 csi-node-driver- calico-system e5c3e20a-a07c-417a-ab09-4d550ade8b72 1432 0 2024-02-12 19:48:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 csi-node-driver-687cb eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie960cc0d9ee [] []}} ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.549 [INFO][2841] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.575 [INFO][2854] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" HandleID="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.584 [INFO][2854] ipam_plugin.go 268: Auto assigning IP ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" HandleID="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cb80), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.8.13", "pod":"csi-node-driver-687cb", "timestamp":"2024-02-12 19:49:01.575552642 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.584 [INFO][2854] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.584 [INFO][2854] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.584 [INFO][2854] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.586 [INFO][2854] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.589 [INFO][2854] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.592 [INFO][2854] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.593 [INFO][2854] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.595 [INFO][2854] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.595 [INFO][2854] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.596 [INFO][2854] ipam.go 1682: Creating new handle: k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22 Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.599 [INFO][2854] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.603 [INFO][2854] ipam.go 1216: Successfully claimed IPs: [192.168.17.193/26] block=192.168.17.192/26 handle="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.603 [INFO][2854] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.193/26] handle="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" host="10.200.8.13" Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.603 [INFO][2854] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:01.626999 env[1333]: 2024-02-12 19:49:01.603 [INFO][2854] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.17.193/26] IPv6=[] ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" HandleID="k8s-pod-network.a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.605 [INFO][2841] k8s.go 385: Populated endpoint ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--687cb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e5c3e20a-a07c-417a-ab09-4d550ade8b72", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"csi-node-driver-687cb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie960cc0d9ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.606 [INFO][2841] k8s.go 386: Calico CNI using IPs: [192.168.17.193/32] ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.606 [INFO][2841] dataplane_linux.go 68: Setting the host side veth name to calie960cc0d9ee ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.619 [INFO][2841] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.619 [INFO][2841] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--687cb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e5c3e20a-a07c-417a-ab09-4d550ade8b72", ResourceVersion:"1432", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22", Pod:"csi-node-driver-687cb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie960cc0d9ee", MAC:"ce:e9:9c:bb:2d:9c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:01.632736 env[1333]: 2024-02-12 19:49:01.625 [INFO][2841] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22" Namespace="calico-system" Pod="csi-node-driver-687cb" WorkloadEndpoint="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:01.647000 audit[2877]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:01.653599 kernel: kauditd_printk_skb: 151 callbacks suppressed Feb 12 19:49:01.653707 kernel: audit: type=1325 audit(1707767341.647:701): table=filter:73 family=2 entries=36 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:01.660072 env[1333]: time="2024-02-12T19:49:01.658790206Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:01.660072 env[1333]: time="2024-02-12T19:49:01.658826206Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:01.660072 env[1333]: time="2024-02-12T19:49:01.658836307Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:01.660072 env[1333]: time="2024-02-12T19:49:01.658939407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22 pid=2886 runtime=io.containerd.runc.v2 Feb 12 19:49:01.647000 audit[2877]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc72638490 a2=0 a3=7ffc7263847c items=0 ppid=2633 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.686043 kernel: audit: type=1300 audit(1707767341.647:701): arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffc72638490 a2=0 a3=7ffc7263847c items=0 ppid=2633 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.647000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:01.702021 kernel: audit: type=1327 audit(1707767341.647:701): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:01.709852 systemd[1]: Started cri-containerd-a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22.scope. Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.748490 kernel: audit: type=1400 audit(1707767341.720:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.748604 kernel: audit: type=1400 audit(1707767341.720:703): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761837 kernel: audit: type=1400 audit(1707767341.720:704): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.792795 kernel: audit: type=1400 audit(1707767341.720:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.792917 kernel: audit: type=1400 audit(1707767341.720:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.792942 kernel: audit: type=1400 audit(1707767341.720:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.748000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.748000 audit: BPF prog-id=92 op=LOAD Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2886 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326330666337326337643632343031383135663433336239316535 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.820033 kernel: audit: type=1400 audit(1707767341.720:708): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2886 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326330666337326337643632343031383135663433336239316535 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.753000 audit: BPF prog-id=93 op=LOAD Feb 12 19:49:01.753000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002d3ff0 items=0 ppid=2886 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326330666337326337643632343031383135663433336239316535 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.761000 audit: BPF prog-id=94 op=LOAD Feb 12 19:49:01.761000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000338038 items=0 ppid=2886 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326330666337326337643632343031383135663433336239316535 Feb 12 19:49:01.778000 audit: BPF prog-id=94 op=UNLOAD Feb 12 19:49:01.778000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { perfmon } for pid=2896 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit[2896]: AVC avc: denied { bpf } for pid=2896 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:01.778000 audit: BPF prog-id=95 op=LOAD Feb 12 19:49:01.778000 audit[2896]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000338448 items=0 ppid=2886 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:01.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138326330666337326337643632343031383135663433336239316535 Feb 12 19:49:01.831019 env[1333]: time="2024-02-12T19:49:01.830958254Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-687cb,Uid:e5c3e20a-a07c-417a-ab09-4d550ade8b72,Namespace:calico-system,Attempt:1,} returns sandbox id \"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22\"" Feb 12 19:49:01.832637 env[1333]: time="2024-02-12T19:49:01.832543659Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:49:02.378536 kubelet[1913]: E0212 19:49:02.378493 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:03.070293 systemd-networkd[1470]: calie960cc0d9ee: Gained IPv6LL Feb 12 19:49:03.379040 kubelet[1913]: E0212 19:49:03.378890 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:03.396688 env[1333]: time="2024-02-12T19:49:03.396194126Z" level=info msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] k8s.go 578: Cleaning up netns ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" iface="eth0" netns="/var/run/netns/cni-bdcd09a6-3b5c-8c11-260f-80d4693290c6" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" iface="eth0" netns="/var/run/netns/cni-bdcd09a6-3b5c-8c11-260f-80d4693290c6" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" iface="eth0" netns="/var/run/netns/cni-bdcd09a6-3b5c-8c11-260f-80d4693290c6" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] k8s.go 585: Releasing IP address(es) ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.435 [INFO][2935] utils.go 188: Calico CNI releasing IP address ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.454 [INFO][2942] ipam_plugin.go 415: Releasing address using handleID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.455 [INFO][2942] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.455 [INFO][2942] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.463 [WARNING][2942] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.463 [INFO][2942] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.464 [INFO][2942] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:03.466432 env[1333]: 2024-02-12 19:49:03.465 [INFO][2935] k8s.go 591: Teardown processing complete. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:03.469701 env[1333]: time="2024-02-12T19:49:03.469345650Z" level=info msg="TearDown network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" successfully" Feb 12 19:49:03.469701 env[1333]: time="2024-02-12T19:49:03.469385450Z" level=info msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" returns successfully" Feb 12 19:49:03.468686 systemd[1]: run-netns-cni\x2dbdcd09a6\x2d3b5c\x2d8c11\x2d260f\x2d80d4693290c6.mount: Deactivated successfully. Feb 12 19:49:03.470539 env[1333]: time="2024-02-12T19:49:03.470506154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-tfb96,Uid:b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e,Namespace:default,Attempt:1,}" Feb 12 19:49:03.659049 systemd-networkd[1470]: calif4ee391b015: Link UP Feb 12 19:49:03.670242 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:03.670355 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif4ee391b015: link becomes ready Feb 12 19:49:03.671409 systemd-networkd[1470]: calif4ee391b015: Gained carrier Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.589 [INFO][2950] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0 nginx-deployment-6d5f899847- default b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e 1443 0 2024-02-12 19:48:50 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 nginx-deployment-6d5f899847-tfb96 eth0 default [] [] [kns.default ksa.default.default] calif4ee391b015 [] []}} ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.589 [INFO][2950] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.623 [INFO][2962] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" HandleID="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.632 [INFO][2962] ipam_plugin.go 268: Auto assigning IP ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" HandleID="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000531ae0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nginx-deployment-6d5f899847-tfb96", "timestamp":"2024-02-12 19:49:03.623588223 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.632 [INFO][2962] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.632 [INFO][2962] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.632 [INFO][2962] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.634 [INFO][2962] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.637 [INFO][2962] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.640 [INFO][2962] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.641 [INFO][2962] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.643 [INFO][2962] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.643 [INFO][2962] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.645 [INFO][2962] ipam.go 1682: Creating new handle: k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3 Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.647 [INFO][2962] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.654 [INFO][2962] ipam.go 1216: Successfully claimed IPs: [192.168.17.194/26] block=192.168.17.192/26 handle="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.654 [INFO][2962] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.194/26] handle="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" host="10.200.8.13" Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.654 [INFO][2962] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:03.677700 env[1333]: 2024-02-12 19:49:03.654 [INFO][2962] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.17.194/26] IPv6=[] ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" HandleID="k8s-pod-network.1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.656 [INFO][2950] k8s.go 385: Populated endpoint ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nginx-deployment-6d5f899847-tfb96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif4ee391b015", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.656 [INFO][2950] k8s.go 386: Calico CNI using IPs: [192.168.17.194/32] ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.656 [INFO][2950] dataplane_linux.go 68: Setting the host side veth name to calif4ee391b015 ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.671 [INFO][2950] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.671 [INFO][2950] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e", ResourceVersion:"1443", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3", Pod:"nginx-deployment-6d5f899847-tfb96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif4ee391b015", MAC:"56:f5:a7:d2:df:28", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:03.678727 env[1333]: 2024-02-12 19:49:03.676 [INFO][2950] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3" Namespace="default" Pod="nginx-deployment-6d5f899847-tfb96" WorkloadEndpoint="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:03.709012 env[1333]: time="2024-02-12T19:49:03.708750784Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:03.709012 env[1333]: time="2024-02-12T19:49:03.708792884Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:03.709012 env[1333]: time="2024-02-12T19:49:03.708807684Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:03.709012 env[1333]: time="2024-02-12T19:49:03.708929984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3 pid=2989 runtime=io.containerd.runc.v2 Feb 12 19:49:03.717000 audit[3000]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=3000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:03.717000 audit[3000]: SYSCALL arch=c000003e syscall=46 success=yes exit=21064 a0=3 a1=7ffe9f09e3b0 a2=0 a3=7ffe9f09e39c items=0 ppid=2633 pid=3000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.717000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:03.737163 systemd[1]: Started cri-containerd-1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3.scope. Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit: BPF prog-id=96 op=LOAD Feb 12 19:49:03.750000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.750000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=2989 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383362626435333364366238383331613930616234303063336632 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=2989 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383362626435333364366238383331613930616234303063336632 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit: BPF prog-id=97 op=LOAD Feb 12 19:49:03.751000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00034dcf0 items=0 ppid=2989 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383362626435333364366238383331613930616234303063336632 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.751000 audit: BPF prog-id=98 op=LOAD Feb 12 19:49:03.751000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00034dd38 items=0 ppid=2989 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383362626435333364366238383331613930616234303063336632 Feb 12 19:49:03.752000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:49:03.752000 audit: BPF prog-id=97 op=UNLOAD Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { perfmon } for pid=3001 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit[3001]: AVC avc: denied { bpf } for pid=3001 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:03.752000 audit: BPF prog-id=99 op=LOAD Feb 12 19:49:03.752000 audit[3001]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0003d0148 items=0 ppid=2989 pid=3001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:03.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166383362626435333364366238383331613930616234303063336632 Feb 12 19:49:03.788911 env[1333]: time="2024-02-12T19:49:03.788861129Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-tfb96,Uid:b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e,Namespace:default,Attempt:1,} returns sandbox id \"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3\"" Feb 12 19:49:04.361852 env[1333]: time="2024-02-12T19:49:04.361797364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:04.366123 env[1333]: time="2024-02-12T19:49:04.366064877Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:04.370810 env[1333]: time="2024-02-12T19:49:04.370769191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:04.379336 kubelet[1913]: E0212 19:49:04.379298 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:04.394786 env[1333]: time="2024-02-12T19:49:04.394727463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:04.395777 env[1333]: time="2024-02-12T19:49:04.395731166Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:49:04.397045 env[1333]: time="2024-02-12T19:49:04.397003970Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:49:04.399207 env[1333]: time="2024-02-12T19:49:04.399172776Z" level=info msg="CreateContainer within sandbox \"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:49:04.432686 env[1333]: time="2024-02-12T19:49:04.432627477Z" level=info msg="CreateContainer within sandbox \"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f28b85bafaf9972ac8f9759a5ffa54eb01f68ce3cd7a23a3033d0738c65623ea\"" Feb 12 19:49:04.433375 env[1333]: time="2024-02-12T19:49:04.433338179Z" level=info msg="StartContainer for \"f28b85bafaf9972ac8f9759a5ffa54eb01f68ce3cd7a23a3033d0738c65623ea\"" Feb 12 19:49:04.449948 systemd[1]: Started cri-containerd-f28b85bafaf9972ac8f9759a5ffa54eb01f68ce3cd7a23a3033d0738c65623ea.scope. Feb 12 19:49:04.471380 systemd[1]: run-containerd-runc-k8s.io-1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3-runc.QROGX5.mount: Deactivated successfully. Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=7fb491173718 items=0 ppid=2886 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386238356261666166393937326163386639373539613566666135 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit: BPF prog-id=100 op=LOAD Feb 12 19:49:04.473000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c00028a4b8 items=0 ppid=2886 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386238356261666166393937326163386639373539613566666135 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit: BPF prog-id=101 op=LOAD Feb 12 19:49:04.473000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c00028a508 items=0 ppid=2886 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386238356261666166393937326163386639373539613566666135 Feb 12 19:49:04.473000 audit: BPF prog-id=101 op=UNLOAD Feb 12 19:49:04.473000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { perfmon } for pid=3034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit[3034]: AVC avc: denied { bpf } for pid=3034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:04.473000 audit: BPF prog-id=102 op=LOAD Feb 12 19:49:04.473000 audit[3034]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c00028a598 items=0 ppid=2886 pid=3034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:04.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632386238356261666166393937326163386639373539613566666135 Feb 12 19:49:04.491700 env[1333]: time="2024-02-12T19:49:04.491651854Z" level=info msg="StartContainer for \"f28b85bafaf9972ac8f9759a5ffa54eb01f68ce3cd7a23a3033d0738c65623ea\" returns successfully" Feb 12 19:49:05.379850 kubelet[1913]: E0212 19:49:05.379791 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:05.438678 systemd-networkd[1470]: calif4ee391b015: Gained IPv6LL Feb 12 19:49:06.380665 kubelet[1913]: E0212 19:49:06.380623 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:07.336679 kubelet[1913]: E0212 19:49:07.336632 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:07.380820 kubelet[1913]: E0212 19:49:07.380782 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:08.208475 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount618379123.mount: Deactivated successfully. Feb 12 19:49:08.381608 kubelet[1913]: E0212 19:49:08.381535 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:09.212704 env[1333]: time="2024-02-12T19:49:09.212649175Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:09.222857 env[1333]: time="2024-02-12T19:49:09.222789603Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:09.228495 env[1333]: time="2024-02-12T19:49:09.228441019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:09.234600 env[1333]: time="2024-02-12T19:49:09.234562035Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:09.234929 env[1333]: time="2024-02-12T19:49:09.234898136Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:49:09.236663 env[1333]: time="2024-02-12T19:49:09.236624741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:49:09.237497 env[1333]: time="2024-02-12T19:49:09.237457743Z" level=info msg="CreateContainer within sandbox \"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:49:09.275845 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2930904078.mount: Deactivated successfully. Feb 12 19:49:09.287858 env[1333]: time="2024-02-12T19:49:09.287803582Z" level=info msg="CreateContainer within sandbox \"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"04a144cdc18d8e8dee995180cbcfeff6e5d87a6131145db405252adb2c8d60f8\"" Feb 12 19:49:09.288649 env[1333]: time="2024-02-12T19:49:09.288606684Z" level=info msg="StartContainer for \"04a144cdc18d8e8dee995180cbcfeff6e5d87a6131145db405252adb2c8d60f8\"" Feb 12 19:49:09.308666 systemd[1]: Started cri-containerd-04a144cdc18d8e8dee995180cbcfeff6e5d87a6131145db405252adb2c8d60f8.scope. Feb 12 19:49:09.330091 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 12 19:49:09.330203 kernel: audit: type=1400 audit(1707767349.324:745): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.356375 kernel: audit: type=1400 audit(1707767349.324:746): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.369437 kernel: audit: type=1400 audit(1707767349.324:747): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.382524 kernel: audit: type=1400 audit(1707767349.324:748): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.382728 kubelet[1913]: E0212 19:49:09.382455 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:09.398895 kernel: audit: type=1400 audit(1707767349.324:749): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.423605 kernel: audit: type=1400 audit(1707767349.324:750): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.423682 kernel: audit: type=1400 audit(1707767349.324:751): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.424017 kernel: audit: type=1400 audit(1707767349.324:752): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.429889 env[1333]: time="2024-02-12T19:49:09.429852073Z" level=info msg="StartContainer for \"04a144cdc18d8e8dee995180cbcfeff6e5d87a6131145db405252adb2c8d60f8\" returns successfully" Feb 12 19:49:09.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.449791 kernel: audit: type=1400 audit(1707767349.324:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.461864 kernel: audit: type=1400 audit(1707767349.355:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.355000 audit: BPF prog-id=103 op=LOAD Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2989 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613134346364633138643865386465653939353138306362636665 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2989 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613134346364633138643865386465653939353138306362636665 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.358000 audit: BPF prog-id=104 op=LOAD Feb 12 19:49:09.358000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000284df0 items=0 ppid=2989 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.358000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613134346364633138643865386465653939353138306362636665 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit: BPF prog-id=105 op=LOAD Feb 12 19:49:09.368000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000284e38 items=0 ppid=2989 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613134346364633138643865386465653939353138306362636665 Feb 12 19:49:09.368000 audit: BPF prog-id=105 op=UNLOAD Feb 12 19:49:09.368000 audit: BPF prog-id=104 op=UNLOAD Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:09.368000 audit: BPF prog-id=106 op=LOAD Feb 12 19:49:09.368000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000285248 items=0 ppid=2989 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:09.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3034613134346364633138643865386465653939353138306362636665 Feb 12 19:49:09.538410 kubelet[1913]: I0212 19:49:09.538374 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-tfb96" podStartSLOduration=14.092731866 podCreationTimestamp="2024-02-12 19:48:50 +0000 UTC" firstStartedPulling="2024-02-12 19:49:03.790239933 +0000 UTC m=+36.835692861" lastFinishedPulling="2024-02-12 19:49:09.235847539 +0000 UTC m=+42.281300467" observedRunningTime="2024-02-12 19:49:09.538330272 +0000 UTC m=+42.583783200" watchObservedRunningTime="2024-02-12 19:49:09.538339472 +0000 UTC m=+42.583792500" Feb 12 19:49:10.382694 kubelet[1913]: E0212 19:49:10.382627 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:11.383586 kubelet[1913]: E0212 19:49:11.383537 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:11.567595 env[1333]: time="2024-02-12T19:49:11.567539062Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:11.594373 env[1333]: time="2024-02-12T19:49:11.594320134Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:11.599410 env[1333]: time="2024-02-12T19:49:11.599363647Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:11.602375 env[1333]: time="2024-02-12T19:49:11.602334455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:11.602820 env[1333]: time="2024-02-12T19:49:11.602780856Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:49:11.604976 env[1333]: time="2024-02-12T19:49:11.604940062Z" level=info msg="CreateContainer within sandbox \"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:49:11.631298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount643614202.mount: Deactivated successfully. Feb 12 19:49:11.642072 env[1333]: time="2024-02-12T19:49:11.642031361Z" level=info msg="CreateContainer within sandbox \"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9ca8d4bc97385aa89d1e614246f8fc686a1de83467db574bc317a7934e0eab58\"" Feb 12 19:49:11.642816 env[1333]: time="2024-02-12T19:49:11.642776063Z" level=info msg="StartContainer for \"9ca8d4bc97385aa89d1e614246f8fc686a1de83467db574bc317a7934e0eab58\"" Feb 12 19:49:11.671321 systemd[1]: Started cri-containerd-9ca8d4bc97385aa89d1e614246f8fc686a1de83467db574bc317a7934e0eab58.scope. Feb 12 19:49:11.686000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.686000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f30706ee9f8 items=0 ppid=2886 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:11.686000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613864346263393733383561613839643165363134323436663866 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit: BPF prog-id=107 op=LOAD Feb 12 19:49:11.687000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022eab8 items=0 ppid=2886 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:11.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613864346263393733383561613839643165363134323436663866 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.687000 audit: BPF prog-id=108 op=LOAD Feb 12 19:49:11.687000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022eb08 items=0 ppid=2886 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:11.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613864346263393733383561613839643165363134323436663866 Feb 12 19:49:11.688000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:49:11.688000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { perfmon } for pid=3129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit[3129]: AVC avc: denied { bpf } for pid=3129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:11.688000 audit: BPF prog-id=109 op=LOAD Feb 12 19:49:11.688000 audit[3129]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022eb98 items=0 ppid=2886 pid=3129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:11.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963613864346263393733383561613839643165363134323436663866 Feb 12 19:49:11.711736 env[1333]: time="2024-02-12T19:49:11.711687546Z" level=info msg="StartContainer for \"9ca8d4bc97385aa89d1e614246f8fc686a1de83467db574bc317a7934e0eab58\" returns successfully" Feb 12 19:49:12.384476 kubelet[1913]: E0212 19:49:12.384414 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:12.445922 kubelet[1913]: I0212 19:49:12.445885 1913 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:49:12.445922 kubelet[1913]: I0212 19:49:12.445929 1913 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:49:12.550278 kubelet[1913]: I0212 19:49:12.550240 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-687cb" podStartSLOduration=34.779307356 podCreationTimestamp="2024-02-12 19:48:28 +0000 UTC" firstStartedPulling="2024-02-12 19:49:01.832246258 +0000 UTC m=+34.877699286" lastFinishedPulling="2024-02-12 19:49:11.603138657 +0000 UTC m=+44.648591585" observedRunningTime="2024-02-12 19:49:12.550056555 +0000 UTC m=+45.595509483" watchObservedRunningTime="2024-02-12 19:49:12.550199655 +0000 UTC m=+45.595652583" Feb 12 19:49:12.626731 systemd[1]: run-containerd-runc-k8s.io-9ca8d4bc97385aa89d1e614246f8fc686a1de83467db574bc317a7934e0eab58-runc.W53O29.mount: Deactivated successfully. Feb 12 19:49:13.385124 kubelet[1913]: E0212 19:49:13.385073 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:14.208000 audit[3161]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.208000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffd2409dc10 a2=0 a3=7ffd2409dbfc items=0 ppid=2059 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.209000 audit[3161]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3161 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.209000 audit[3161]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffd2409dc10 a2=0 a3=31030 items=0 ppid=2059 pid=3161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.209000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.222000 audit[3165]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.222000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffeb05eaa80 a2=0 a3=7ffeb05eaa6c items=0 ppid=2059 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.223000 audit[3165]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3165 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:14.223000 audit[3165]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffeb05eaa80 a2=0 a3=31030 items=0 ppid=2059 pid=3165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:14.233265 kubelet[1913]: I0212 19:49:14.233230 1913 topology_manager.go:215] "Topology Admit Handler" podUID="a4d3cd51-4277-4644-a461-c4d9cbbd3820" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 19:49:14.237937 systemd[1]: Created slice kubepods-besteffort-poda4d3cd51_4277_4644_a461_c4d9cbbd3820.slice. Feb 12 19:49:14.368866 kubelet[1913]: I0212 19:49:14.368788 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/a4d3cd51-4277-4644-a461-c4d9cbbd3820-data\") pod \"nfs-server-provisioner-0\" (UID: \"a4d3cd51-4277-4644-a461-c4d9cbbd3820\") " pod="default/nfs-server-provisioner-0" Feb 12 19:49:14.369120 kubelet[1913]: I0212 19:49:14.368951 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pj6wz\" (UniqueName: \"kubernetes.io/projected/a4d3cd51-4277-4644-a461-c4d9cbbd3820-kube-api-access-pj6wz\") pod \"nfs-server-provisioner-0\" (UID: \"a4d3cd51-4277-4644-a461-c4d9cbbd3820\") " pod="default/nfs-server-provisioner-0" Feb 12 19:49:14.386110 kubelet[1913]: E0212 19:49:14.386074 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:14.542902 env[1333]: time="2024-02-12T19:49:14.542036787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a4d3cd51-4277-4644-a461-c4d9cbbd3820,Namespace:default,Attempt:0,}" Feb 12 19:49:14.690369 systemd-networkd[1470]: cali60e51b789ff: Link UP Feb 12 19:49:14.704718 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:14.704840 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:49:14.705773 systemd-networkd[1470]: cali60e51b789ff: Gained carrier Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.629 [INFO][3167] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default a4d3cd51-4277-4644-a461-c4d9cbbd3820 1505 0 2024-02-12 19:49:14 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.8.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.630 [INFO][3167] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.652 [INFO][3179] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" HandleID="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.662 [INFO][3179] ipam_plugin.go 268: Auto assigning IP ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" HandleID="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027d0f0), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:49:14.652340967 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.662 [INFO][3179] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.662 [INFO][3179] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.662 [INFO][3179] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.664 [INFO][3179] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.667 [INFO][3179] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.670 [INFO][3179] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.671 [INFO][3179] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.673 [INFO][3179] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.673 [INFO][3179] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.674 [INFO][3179] ipam.go 1682: Creating new handle: k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22 Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.678 [INFO][3179] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.685 [INFO][3179] ipam.go 1216: Successfully claimed IPs: [192.168.17.195/26] block=192.168.17.192/26 handle="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.686 [INFO][3179] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.195/26] handle="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" host="10.200.8.13" Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.686 [INFO][3179] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:14.710846 env[1333]: 2024-02-12 19:49:14.686 [INFO][3179] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.17.195/26] IPv6=[] ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" HandleID="k8s-pod-network.113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Workload="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.712383 env[1333]: 2024-02-12 19:49:14.687 [INFO][3167] k8s.go 385: Populated endpoint ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a4d3cd51-4277-4644-a461-c4d9cbbd3820", ResourceVersion:"1505", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:14.712383 env[1333]: 2024-02-12 19:49:14.687 [INFO][3167] k8s.go 386: Calico CNI using IPs: [192.168.17.195/32] ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.712383 env[1333]: 2024-02-12 19:49:14.687 [INFO][3167] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.712383 env[1333]: 2024-02-12 19:49:14.690 [INFO][3167] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.712562 env[1333]: 2024-02-12 19:49:14.691 [INFO][3167] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"a4d3cd51-4277-4644-a461-c4d9cbbd3820", ResourceVersion:"1505", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.17.195/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"62:35:bb:a7:7a:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:14.712562 env[1333]: 2024-02-12 19:49:14.709 [INFO][3167] k8s.go 491: Wrote updated endpoint to datastore ContainerID="113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.8.13-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:49:14.727000 audit[3201]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3201 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:14.734051 kernel: kauditd_printk_skb: 102 callbacks suppressed Feb 12 19:49:14.734153 kernel: audit: type=1325 audit(1707767354.727:773): table=filter:79 family=2 entries=38 op=nft_register_chain pid=3201 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:14.735317 env[1333]: time="2024-02-12T19:49:14.735261977Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:14.735458 env[1333]: time="2024-02-12T19:49:14.735438478Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:14.735552 env[1333]: time="2024-02-12T19:49:14.735535078Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:14.735743 env[1333]: time="2024-02-12T19:49:14.735717779Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22 pid=3210 runtime=io.containerd.runc.v2 Feb 12 19:49:14.727000 audit[3201]: SYSCALL arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7fff7898edc0 a2=0 a3=7fff7898edac items=0 ppid=2633 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.759369 systemd[1]: Started cri-containerd-113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22.scope. Feb 12 19:49:14.727000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:14.790841 kernel: audit: type=1300 audit(1707767354.727:773): arch=c000003e syscall=46 success=yes exit=19500 a0=3 a1=7fff7898edc0 a2=0 a3=7fff7898edac items=0 ppid=2633 pid=3201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.791012 kernel: audit: type=1327 audit(1707767354.727:773): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:14.805026 kernel: audit: type=1400 audit(1707767354.783:774): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.850512 kernel: audit: type=1400 audit(1707767354.783:775): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.850622 kernel: audit: type=1400 audit(1707767354.783:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.850649 kernel: audit: type=1400 audit(1707767354.783:777): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.876229 kernel: audit: type=1400 audit(1707767354.783:778): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.876317 kernel: audit: type=1400 audit(1707767354.783:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.888925 kernel: audit: type=1400 audit(1707767354.783:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit: BPF prog-id=110 op=LOAD Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3210 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336434616536643833346432393433346261346236623862303230 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3210 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336434616536643833346432393433346261346236623862303230 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.790000 audit: BPF prog-id=111 op=LOAD Feb 12 19:49:14.790000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0520 items=0 ppid=3210 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336434616536643833346432393433346261346236623862303230 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.837000 audit: BPF prog-id=112 op=LOAD Feb 12 19:49:14.837000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003749d8 items=0 ppid=3210 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336434616536643833346432393433346261346236623862303230 Feb 12 19:49:14.862000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:49:14.862000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:14.862000 audit: BPF prog-id=113 op=LOAD Feb 12 19:49:14.862000 audit[3217]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000374de8 items=0 ppid=3210 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:14.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131336434616536643833346432393433346261346236623862303230 Feb 12 19:49:14.930569 env[1333]: time="2024-02-12T19:49:14.930516473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:a4d3cd51-4277-4644-a461-c4d9cbbd3820,Namespace:default,Attempt:0,} returns sandbox id \"113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22\"" Feb 12 19:49:14.932477 env[1333]: time="2024-02-12T19:49:14.932267477Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:49:15.387241 kubelet[1913]: E0212 19:49:15.387180 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:16.387520 kubelet[1913]: E0212 19:49:16.387472 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:16.702345 systemd-networkd[1470]: cali60e51b789ff: Gained IPv6LL Feb 12 19:49:17.388656 kubelet[1913]: E0212 19:49:17.388608 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:17.706595 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1618418722.mount: Deactivated successfully. Feb 12 19:49:18.389717 kubelet[1913]: E0212 19:49:18.389649 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:19.390458 kubelet[1913]: E0212 19:49:19.390402 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:20.164936 env[1333]: time="2024-02-12T19:49:20.164880551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:20.173114 env[1333]: time="2024-02-12T19:49:20.173067570Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:20.176086 env[1333]: time="2024-02-12T19:49:20.176044177Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:20.182042 env[1333]: time="2024-02-12T19:49:20.182005791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:20.182640 env[1333]: time="2024-02-12T19:49:20.182606093Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:fd0b16f70b66b72bcb2f91d556fa33eba02729c44ffc5f2c16130e7f9fbed3c4\"" Feb 12 19:49:20.185007 env[1333]: time="2024-02-12T19:49:20.184968398Z" level=info msg="CreateContainer within sandbox \"113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:49:20.221080 env[1333]: time="2024-02-12T19:49:20.221029182Z" level=info msg="CreateContainer within sandbox \"113d4ae6d834d29434ba4b6b8b02092bbfb59b2f343ae86e419ef65a8848da22\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"396ba74b0c72b01fb84602e591cc964786bf15f82621643704543a9e22c2e936\"" Feb 12 19:49:20.221819 env[1333]: time="2024-02-12T19:49:20.221747683Z" level=info msg="StartContainer for \"396ba74b0c72b01fb84602e591cc964786bf15f82621643704543a9e22c2e936\"" Feb 12 19:49:20.247630 systemd[1]: run-containerd-runc-k8s.io-396ba74b0c72b01fb84602e591cc964786bf15f82621643704543a9e22c2e936-runc.oKunpd.mount: Deactivated successfully. Feb 12 19:49:20.250749 systemd[1]: Started cri-containerd-396ba74b0c72b01fb84602e591cc964786bf15f82621643704543a9e22c2e936.scope. Feb 12 19:49:20.268031 kernel: kauditd_printk_skb: 50 callbacks suppressed Feb 12 19:49:20.268156 kernel: audit: type=1400 audit(1707767360.261:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.306448 kernel: audit: type=1400 audit(1707767360.261:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.306575 kernel: audit: type=1400 audit(1707767360.261:794): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.306611 kernel: audit: type=1400 audit(1707767360.261:795): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.345792 kernel: audit: type=1400 audit(1707767360.261:796): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.345924 kernel: audit: type=1400 audit(1707767360.261:797): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.370517 kernel: audit: type=1400 audit(1707767360.261:798): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.370637 kernel: audit: type=1400 audit(1707767360.261:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.370662 kernel: audit: type=1400 audit(1707767360.261:800): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.388019 kernel: audit: type=1400 audit(1707767360.262:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.391460 kubelet[1913]: E0212 19:49:20.391395 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:20.395707 env[1333]: time="2024-02-12T19:49:20.395665187Z" level=info msg="StartContainer for \"396ba74b0c72b01fb84602e591cc964786bf15f82621643704543a9e22c2e936\" returns successfully" Feb 12 19:49:20.262000 audit: BPF prog-id=114 op=LOAD Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3210 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366261373462306337326230316662383436303265353931636339 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3210 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366261373462306337326230316662383436303265353931636339 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.267000 audit: BPF prog-id=115 op=LOAD Feb 12 19:49:20.267000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002590f0 items=0 ppid=3210 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366261373462306337326230316662383436303265353931636339 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.279000 audit: BPF prog-id=116 op=LOAD Feb 12 19:49:20.279000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a4088 items=0 ppid=3210 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.279000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366261373462306337326230316662383436303265353931636339 Feb 12 19:49:20.293000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:49:20.293000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { perfmon } for pid=3258 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit[3258]: AVC avc: denied { bpf } for pid=3258 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:20.293000 audit: BPF prog-id=117 op=LOAD Feb 12 19:49:20.293000 audit[3258]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a4498 items=0 ppid=3210 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366261373462306337326230316662383436303265353931636339 Feb 12 19:49:20.432000 audit[3287]: AVC avc: denied { search } for pid=3287 comm="rpcbind" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:49:20.432000 audit[3287]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7fb20f1190c0 a2=0 a3=0 items=0 ppid=3269 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 key=(null) Feb 12 19:49:20.432000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:49:20.471000 audit[3292]: AVC avc: denied { search } for pid=3292 comm="dbus-daemon" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:49:20.471000 audit[3292]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7ff3540270c0 a2=0 a3=0 items=0 ppid=3269 pid=3292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 key=(null) Feb 12 19:49:20.471000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:49:20.474000 audit[3293]: AVC avc: denied { watch } for pid=3293 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=538036 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c389 tclass=dir permissive=0 Feb 12 19:49:20.474000 audit[3293]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=563ef58357e0 a2=2c8 a3=7fff74e41bbc items=0 ppid=3269 pid=3293 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 key=(null) Feb 12 19:49:20.474000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:49:20.479000 audit[3294]: AVC avc: denied { read } for pid=3294 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=26786 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:49:20.479000 audit[3294]: SYSCALL arch=c000003e syscall=2 success=no exit=-13 a0=7f65822c2320 a1=80000 a2=d a3=7fff88cd64d0 items=0 ppid=3269 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 key=(null) Feb 12 19:49:20.479000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:49:20.480000 audit[3294]: AVC avc: denied { search } for pid=3294 comm="ganesha.nfsd" name="crypto" dev="proc" ino=26734 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:49:20.480000 audit[3294]: SYSCALL arch=c000003e syscall=257 success=no exit=-13 a0=ffffff9c a1=7f65818160c0 a2=0 a3=0 items=0 ppid=3269 pid=3294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c389 key=(null) Feb 12 19:49:20.480000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:49:20.609133 kubelet[1913]: I0212 19:49:20.609093 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.358071564 podCreationTimestamp="2024-02-12 19:49:14 +0000 UTC" firstStartedPulling="2024-02-12 19:49:14.931959976 +0000 UTC m=+47.977412904" lastFinishedPulling="2024-02-12 19:49:20.182950393 +0000 UTC m=+53.228403421" observedRunningTime="2024-02-12 19:49:20.608908481 +0000 UTC m=+53.654361509" watchObservedRunningTime="2024-02-12 19:49:20.609062081 +0000 UTC m=+53.654515109" Feb 12 19:49:20.623000 audit[3299]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.623000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffde8f5a290 a2=0 a3=7ffde8f5a27c items=0 ppid=2059 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:20.626000 audit[3299]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:49:20.626000 audit[3299]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffde8f5a290 a2=0 a3=7ffde8f5a27c items=0 ppid=2059 pid=3299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:20.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:49:21.392465 kubelet[1913]: E0212 19:49:21.392408 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:21.481366 systemd[1]: run-containerd-runc-k8s.io-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f-runc.PVdW3i.mount: Deactivated successfully. Feb 12 19:49:22.393246 kubelet[1913]: E0212 19:49:22.393188 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:23.393928 kubelet[1913]: E0212 19:49:23.393868 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:24.395011 kubelet[1913]: E0212 19:49:24.394938 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:25.396118 kubelet[1913]: E0212 19:49:25.396065 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:26.396522 kubelet[1913]: E0212 19:49:26.396468 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:27.337028 kubelet[1913]: E0212 19:49:27.336974 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:27.356804 env[1333]: time="2024-02-12T19:49:27.356755907Z" level=info msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" Feb 12 19:49:27.397031 kubelet[1913]: E0212 19:49:27.396979 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.394 [WARNING][3341] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--687cb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e5c3e20a-a07c-417a-ab09-4d550ade8b72", ResourceVersion:"1481", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22", Pod:"csi-node-driver-687cb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie960cc0d9ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.394 [INFO][3341] k8s.go 578: Cleaning up netns ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.394 [INFO][3341] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" iface="eth0" netns="" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.394 [INFO][3341] k8s.go 585: Releasing IP address(es) ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.394 [INFO][3341] utils.go 188: Calico CNI releasing IP address ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.415 [INFO][3347] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.415 [INFO][3347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.416 [INFO][3347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.423 [WARNING][3347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.423 [INFO][3347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.425 [INFO][3347] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:27.427903 env[1333]: 2024-02-12 19:49:27.426 [INFO][3341] k8s.go 591: Teardown processing complete. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.428620 env[1333]: time="2024-02-12T19:49:27.427924157Z" level=info msg="TearDown network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" successfully" Feb 12 19:49:27.428620 env[1333]: time="2024-02-12T19:49:27.427958258Z" level=info msg="StopPodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" returns successfully" Feb 12 19:49:27.429051 env[1333]: time="2024-02-12T19:49:27.429019860Z" level=info msg="RemovePodSandbox for \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" Feb 12 19:49:27.429155 env[1333]: time="2024-02-12T19:49:27.429052060Z" level=info msg="Forcibly stopping sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\"" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.479 [WARNING][3369] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-csi--node--driver--687cb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"e5c3e20a-a07c-417a-ab09-4d550ade8b72", ResourceVersion:"1481", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"a82c0fc72c7d62401815f433b91e55eef182ff3e42546af95faea77856ccbf22", Pod:"csi-node-driver-687cb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.193/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie960cc0d9ee", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.479 [INFO][3369] k8s.go 578: Cleaning up netns ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.479 [INFO][3369] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" iface="eth0" netns="" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.479 [INFO][3369] k8s.go 585: Releasing IP address(es) ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.479 [INFO][3369] utils.go 188: Calico CNI releasing IP address ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.501 [INFO][3375] ipam_plugin.go 415: Releasing address using handleID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.501 [INFO][3375] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.501 [INFO][3375] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.509 [WARNING][3375] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.509 [INFO][3375] ipam_plugin.go 443: Releasing address using workloadID ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" HandleID="k8s-pod-network.24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Workload="10.200.8.13-k8s-csi--node--driver--687cb-eth0" Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.510 [INFO][3375] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:27.512712 env[1333]: 2024-02-12 19:49:27.511 [INFO][3369] k8s.go 591: Teardown processing complete. ContainerID="24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c" Feb 12 19:49:27.513486 env[1333]: time="2024-02-12T19:49:27.512743537Z" level=info msg="TearDown network for sandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" successfully" Feb 12 19:49:27.691407 env[1333]: time="2024-02-12T19:49:27.691334114Z" level=info msg="RemovePodSandbox \"24ef94a43374fb33b8542c6a1dfc66662dfe426a0062e3a57a906453a3d15a9c\" returns successfully" Feb 12 19:49:27.692142 env[1333]: time="2024-02-12T19:49:27.692098215Z" level=info msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.726 [WARNING][3394] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3", Pod:"nginx-deployment-6d5f899847-tfb96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif4ee391b015", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.726 [INFO][3394] k8s.go 578: Cleaning up netns ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.726 [INFO][3394] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" iface="eth0" netns="" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.726 [INFO][3394] k8s.go 585: Releasing IP address(es) ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.726 [INFO][3394] utils.go 188: Calico CNI releasing IP address ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.750 [INFO][3400] ipam_plugin.go 415: Releasing address using handleID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.750 [INFO][3400] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.750 [INFO][3400] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.758 [WARNING][3400] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.758 [INFO][3400] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.760 [INFO][3400] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:27.762116 env[1333]: 2024-02-12 19:49:27.761 [INFO][3394] k8s.go 591: Teardown processing complete. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.762839 env[1333]: time="2024-02-12T19:49:27.762155663Z" level=info msg="TearDown network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" successfully" Feb 12 19:49:27.762839 env[1333]: time="2024-02-12T19:49:27.762222063Z" level=info msg="StopPodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" returns successfully" Feb 12 19:49:27.762839 env[1333]: time="2024-02-12T19:49:27.762767865Z" level=info msg="RemovePodSandbox for \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" Feb 12 19:49:27.762839 env[1333]: time="2024-02-12T19:49:27.762811965Z" level=info msg="Forcibly stopping sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\"" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.796 [WARNING][3419] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b2afb2c4-26bf-4c5b-aa79-1ed038c2f15e", ResourceVersion:"1467", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 48, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"1f83bbd533d6b8831a90ab400c3f2917554d15b0f5853b1403639ea5a42292e3", Pod:"nginx-deployment-6d5f899847-tfb96", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.194/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif4ee391b015", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.797 [INFO][3419] k8s.go 578: Cleaning up netns ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.797 [INFO][3419] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" iface="eth0" netns="" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.797 [INFO][3419] k8s.go 585: Releasing IP address(es) ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.797 [INFO][3419] utils.go 188: Calico CNI releasing IP address ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.814 [INFO][3425] ipam_plugin.go 415: Releasing address using handleID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.814 [INFO][3425] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.814 [INFO][3425] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.821 [WARNING][3425] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.822 [INFO][3425] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" HandleID="k8s-pod-network.e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Workload="10.200.8.13-k8s-nginx--deployment--6d5f899847--tfb96-eth0" Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.823 [INFO][3425] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:27.825011 env[1333]: 2024-02-12 19:49:27.824 [INFO][3419] k8s.go 591: Teardown processing complete. ContainerID="e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e" Feb 12 19:49:27.825651 env[1333]: time="2024-02-12T19:49:27.825570097Z" level=info msg="TearDown network for sandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" successfully" Feb 12 19:49:28.043232 env[1333]: time="2024-02-12T19:49:28.043097655Z" level=info msg="RemovePodSandbox \"e173483c2b3be4ef7bd168aea0bce3f4dfa76dca63d9d48d92c94c6c29b0972e\" returns successfully" Feb 12 19:49:28.398132 kubelet[1913]: E0212 19:49:28.398069 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:29.398677 kubelet[1913]: E0212 19:49:29.398633 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:30.399680 kubelet[1913]: E0212 19:49:30.399613 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:31.400011 kubelet[1913]: E0212 19:49:31.399963 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:32.400186 kubelet[1913]: E0212 19:49:32.400125 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:33.400925 kubelet[1913]: E0212 19:49:33.400840 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:34.401873 kubelet[1913]: E0212 19:49:34.401814 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:35.402843 kubelet[1913]: E0212 19:49:35.402797 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:36.403215 kubelet[1913]: E0212 19:49:36.403160 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:37.403577 kubelet[1913]: E0212 19:49:37.403530 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:38.404629 kubelet[1913]: E0212 19:49:38.404560 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:39.404943 kubelet[1913]: E0212 19:49:39.404898 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:40.405745 kubelet[1913]: E0212 19:49:40.405683 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:41.406090 kubelet[1913]: E0212 19:49:41.406056 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:42.407007 kubelet[1913]: E0212 19:49:42.406943 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:43.408067 kubelet[1913]: E0212 19:49:43.408019 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:44.409030 kubelet[1913]: E0212 19:49:44.408961 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:45.410128 kubelet[1913]: E0212 19:49:45.410066 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:45.892358 kubelet[1913]: I0212 19:49:45.892316 1913 topology_manager.go:215] "Topology Admit Handler" podUID="19390fef-7a7f-45bf-a081-f57ae835d4b6" podNamespace="default" podName="test-pod-1" Feb 12 19:49:45.898767 systemd[1]: Created slice kubepods-besteffort-pod19390fef_7a7f_45bf_a081_f57ae835d4b6.slice. Feb 12 19:49:46.053015 kubelet[1913]: I0212 19:49:46.052954 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-52993f21-201f-4fcf-a4b3-bef96b58d344\" (UniqueName: \"kubernetes.io/nfs/19390fef-7a7f-45bf-a081-f57ae835d4b6-pvc-52993f21-201f-4fcf-a4b3-bef96b58d344\") pod \"test-pod-1\" (UID: \"19390fef-7a7f-45bf-a081-f57ae835d4b6\") " pod="default/test-pod-1" Feb 12 19:49:46.053251 kubelet[1913]: I0212 19:49:46.053055 1913 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bz69w\" (UniqueName: \"kubernetes.io/projected/19390fef-7a7f-45bf-a081-f57ae835d4b6-kube-api-access-bz69w\") pod \"test-pod-1\" (UID: \"19390fef-7a7f-45bf-a081-f57ae835d4b6\") " pod="default/test-pod-1" Feb 12 19:49:46.192523 kernel: Failed to create system directory netfs Feb 12 19:49:46.192671 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:49:46.192700 kernel: audit: type=1400 audit(1707767386.181:817): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.192731 kernel: Failed to create system directory netfs Feb 12 19:49:46.181000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.211662 kernel: audit: type=1400 audit(1707767386.181:817): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.211785 kernel: Failed to create system directory netfs Feb 12 19:49:46.181000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.230800 kernel: audit: type=1400 audit(1707767386.181:817): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.230909 kernel: Failed to create system directory netfs Feb 12 19:49:46.181000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.266312 kernel: audit: type=1400 audit(1707767386.181:817): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.181000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.181000 audit[3461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560925a305e0 a1=153bc a2=5609245b12b0 a3=5 items=0 ppid=852 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.291268 kernel: audit: type=1300 audit(1707767386.181:817): arch=c000003e syscall=175 success=yes exit=0 a0=560925a305e0 a1=153bc a2=5609245b12b0 a3=5 items=0 ppid=852 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.291408 kernel: Failed to create system directory fscache Feb 12 19:49:46.291431 kernel: audit: type=1327 audit(1707767386.181:817): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:46.181000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:46.301997 kernel: Failed to create system directory fscache Feb 12 19:49:46.302113 kernel: audit: type=1400 audit(1707767386.276:818): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.320324 kernel: Failed to create system directory fscache Feb 12 19:49:46.338786 kernel: Failed to create system directory fscache Feb 12 19:49:46.338885 kernel: audit: type=1400 audit(1707767386.276:818): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.338926 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.357539 kernel: audit: type=1400 audit(1707767386.276:818): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.357654 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.376083 kernel: audit: type=1400 audit(1707767386.276:818): avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.376202 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.405253 kernel: Failed to create system directory fscache Feb 12 19:49:46.405377 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.410019 kernel: Failed to create system directory fscache Feb 12 19:49:46.410182 kubelet[1913]: E0212 19:49:46.410155 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.416696 kernel: Failed to create system directory fscache Feb 12 19:49:46.416768 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.423006 kernel: Failed to create system directory fscache Feb 12 19:49:46.423067 kernel: Failed to create system directory fscache Feb 12 19:49:46.276000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.276000 audit[3461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560925c459c0 a1=4c0fc a2=5609245b12b0 a3=5 items=0 ppid=852 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.276000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:46.430006 kernel: FS-Cache: Loaded Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.481868 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.481970 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.482010 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.488167 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.488244 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.494421 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.494490 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.500439 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.500500 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.508040 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.508119 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.514077 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.514143 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.519936 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.520027 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.525822 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.525889 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.529344 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.534470 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.534527 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.540317 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.540377 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.545924 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.546002 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.551397 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.554463 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.554521 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.559880 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.559937 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.565147 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.565204 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.571328 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.571384 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.576663 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.576724 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.581710 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.581767 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.585012 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.589355 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.589406 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.594175 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.594228 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.599210 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.599261 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.604332 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.604382 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.609259 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.609310 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.614090 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.614138 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.619052 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.619101 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.623634 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.623678 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.628333 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.628381 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.634350 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.634398 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.637524 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.641648 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.641710 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.648943 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.649003 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.649028 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.654092 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.654148 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.658896 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.658945 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.663713 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.663763 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.668584 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.668623 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.673410 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.673459 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.678496 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.678559 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.683692 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.683733 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.688430 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.688480 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.691459 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.695530 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.695570 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.700523 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.700570 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.705320 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.705360 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.710081 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.710126 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.715042 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.715090 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.719872 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.719912 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.724488 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.726972 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.727032 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.732006 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.732065 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.736517 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.736570 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.741223 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.742015 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.746531 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.746577 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.751464 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.751514 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.756402 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.756449 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.762408 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.762457 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.767206 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.767257 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.771888 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.771934 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.778667 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.778710 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.783777 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.783826 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.788699 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.788744 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.793731 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.793778 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.797010 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.801075 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.801135 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.462000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.805963 kernel: Failed to create system directory sunrpc Feb 12 19:49:46.817572 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:49:46.817638 kernel: RPC: Registered udp transport module. Feb 12 19:49:46.817664 kernel: RPC: Registered tcp transport module. Feb 12 19:49:46.823431 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:49:46.462000 audit[3461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560925c91ad0 a1=1588c4 a2=5609245b12b0 a3=5 items=6 ppid=852 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.462000 audit: CWD cwd="/" Feb 12 19:49:46.462000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PATH item=1 name=(null) inode=27765 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PATH item=2 name=(null) inode=27765 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PATH item=3 name=(null) inode=27766 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PATH item=4 name=(null) inode=27765 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PATH item=5 name=(null) inode=27767 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:49:46.462000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.885255 kernel: Failed to create system directory nfs Feb 12 19:49:46.885361 kernel: Failed to create system directory nfs Feb 12 19:49:46.885385 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.890302 kernel: Failed to create system directory nfs Feb 12 19:49:46.890348 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.895142 kernel: Failed to create system directory nfs Feb 12 19:49:46.895198 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.900013 kernel: Failed to create system directory nfs Feb 12 19:49:46.900056 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.905051 kernel: Failed to create system directory nfs Feb 12 19:49:46.905104 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.909937 kernel: Failed to create system directory nfs Feb 12 19:49:46.910000 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.914958 kernel: Failed to create system directory nfs Feb 12 19:49:46.915028 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.919953 kernel: Failed to create system directory nfs Feb 12 19:49:46.920017 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.924745 kernel: Failed to create system directory nfs Feb 12 19:49:46.924804 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.929863 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.934821 kernel: Failed to create system directory nfs Feb 12 19:49:46.934882 kernel: Failed to create system directory nfs Feb 12 19:49:46.934906 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.940262 kernel: Failed to create system directory nfs Feb 12 19:49:46.940315 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.945084 kernel: Failed to create system directory nfs Feb 12 19:49:46.945134 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.949961 kernel: Failed to create system directory nfs Feb 12 19:49:46.950017 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.955007 kernel: Failed to create system directory nfs Feb 12 19:49:46.955046 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.959909 kernel: Failed to create system directory nfs Feb 12 19:49:46.959961 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.962318 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.964651 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.966926 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.969422 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.971881 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.974416 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.976902 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.979353 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.981885 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.988611 kernel: Failed to create system directory nfs Feb 12 19:49:46.988718 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.992401 kernel: Failed to create system directory nfs Feb 12 19:49:46.992456 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.997113 kernel: Failed to create system directory nfs Feb 12 19:49:46.997167 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.003268 kernel: Failed to create system directory nfs Feb 12 19:49:47.003333 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.007977 kernel: Failed to create system directory nfs Feb 12 19:49:47.008065 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.012624 kernel: Failed to create system directory nfs Feb 12 19:49:47.012661 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.017428 kernel: Failed to create system directory nfs Feb 12 19:49:47.017487 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.022457 kernel: Failed to create system directory nfs Feb 12 19:49:47.022518 kernel: Failed to create system directory nfs Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:46.868000 audit[3461]: AVC avc: denied { confidentiality } for pid=3461 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.027328 kernel: Failed to create system directory nfs Feb 12 19:49:47.041093 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:49:46.868000 audit[3461]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560925e34680 a1=e29dc a2=5609245b12b0 a3=5 items=0 ppid=852 pid=3461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:46.868000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.100662 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.100767 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.100794 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.105749 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.105839 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.110956 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.111035 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.116023 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.116095 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.119047 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.123441 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.124040 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.129645 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.129703 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.134458 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.134499 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.139156 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.139201 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.144074 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.144129 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.147061 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.151235 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.151285 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.156160 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.156207 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.159044 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.163465 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.163529 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.168112 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.168169 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.172942 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.173013 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.177793 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.177856 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.182566 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.182627 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.187623 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.187682 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.192355 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.192402 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.197063 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.197117 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.202127 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.202201 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.207010 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.207055 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.211813 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.211862 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.216629 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.216676 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.221515 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.221552 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.226195 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.226308 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.230872 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.230922 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.235916 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.235978 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.240778 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.240833 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.244234 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.247880 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.247943 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.252103 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.256452 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.256499 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.261117 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.261166 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.265774 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.265825 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.271050 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.271094 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.273004 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.277834 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.277884 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.282680 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.282718 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.287625 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.287676 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.292288 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.292324 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.296919 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.296969 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.299271 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.301733 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.305043 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.307043 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.311408 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.311461 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.316060 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.316098 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.320709 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.320743 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.080000 audit[3466]: AVC avc: denied { confidentiality } for pid=3466 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.325290 kernel: Failed to create system directory nfs4 Feb 12 19:49:47.336793 kubelet[1913]: E0212 19:49:47.336740 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:47.410795 kubelet[1913]: E0212 19:49:47.410736 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:47.471009 kernel: NFS: Registering the id_resolver key type Feb 12 19:49:47.471155 kernel: Key type id_resolver registered Feb 12 19:49:47.471181 kernel: Key type id_legacy registered Feb 12 19:49:47.080000 audit[3466]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7f066c38a010 a1=1d3cc4 a2=564a751142b0 a3=5 items=0 ppid=852 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.080000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.495580 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.495674 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.495697 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.500864 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.500940 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.506332 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.506418 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.515216 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.515303 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.515334 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.520227 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.523407 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.523470 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.528824 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.528892 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.534024 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.534076 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.538956 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.539040 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.544229 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.544288 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.549224 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.549287 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.554311 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.554375 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.483000 audit[3467]: AVC avc: denied { confidentiality } for pid=3467 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:49:47.559366 kernel: Failed to create system directory rpcgss Feb 12 19:49:47.483000 audit[3467]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=7fc6e3065010 a1=4f524 a2=555a1ef4b2b0 a3=5 items=0 ppid=852 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.483000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:49:47.717278 nfsidmap[3474]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-4cc8fcdc9a' Feb 12 19:49:47.723974 nfsidmap[3475]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-4cc8fcdc9a' Feb 12 19:49:47.735000 audit[1427]: AVC avc: denied { watch_reads } for pid=1427 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:47.735000 audit[1427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559b1817f9c0 a2=10 a3=c30c322e26d319a8 items=0 ppid=1 pid=1427 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:47.735000 audit[1427]: AVC avc: denied { watch_reads } for pid=1427 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:47.735000 audit[1427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559b1817f9c0 a2=10 a3=c30c322e26d319a8 items=0 ppid=1 pid=1427 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:47.735000 audit[1427]: AVC avc: denied { watch_reads } for pid=1427 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:47.735000 audit[1427]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=e a1=559b1817f9c0 a2=10 a3=c30c322e26d319a8 items=0 ppid=1 pid=1427 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:47.735000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:49:47.736000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:47.736000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:47.736000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:49:48.003229 env[1333]: time="2024-02-12T19:49:48.003184583Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19390fef-7a7f-45bf-a081-f57ae835d4b6,Namespace:default,Attempt:0,}" Feb 12 19:49:48.127438 systemd-networkd[1470]: cali5ec59c6bf6e: Link UP Feb 12 19:49:48.136678 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:49:48.136776 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:49:48.137354 systemd-networkd[1470]: cali5ec59c6bf6e: Gained carrier Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.064 [INFO][3477] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.8.13-k8s-test--pod--1-eth0 default 19390fef-7a7f-45bf-a081-f57ae835d4b6 1607 0 2024-02-12 19:49:15 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.8.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.064 [INFO][3477] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.088 [INFO][3489] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" HandleID="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Workload="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.099 [INFO][3489] ipam_plugin.go 268: Auto assigning IP ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" HandleID="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Workload="10.200.8.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027db40), Attrs:map[string]string{"namespace":"default", "node":"10.200.8.13", "pod":"test-pod-1", "timestamp":"2024-02-12 19:49:48.088701629 +0000 UTC"}, Hostname:"10.200.8.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.099 [INFO][3489] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.099 [INFO][3489] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.099 [INFO][3489] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.8.13' Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.100 [INFO][3489] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.103 [INFO][3489] ipam.go 372: Looking up existing affinities for host host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.106 [INFO][3489] ipam.go 489: Trying affinity for 192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.108 [INFO][3489] ipam.go 155: Attempting to load block cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.110 [INFO][3489] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.192/26 host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.110 [INFO][3489] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.192/26 handle="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.111 [INFO][3489] ipam.go 1682: Creating new handle: k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.114 [INFO][3489] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.192/26 handle="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.123 [INFO][3489] ipam.go 1216: Successfully claimed IPs: [192.168.17.196/26] block=192.168.17.192/26 handle="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.123 [INFO][3489] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.196/26] handle="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" host="10.200.8.13" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.123 [INFO][3489] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.123 [INFO][3489] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.17.196/26] IPv6=[] ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" HandleID="k8s-pod-network.39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Workload="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.124 [INFO][3477] k8s.go 385: Populated endpoint ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19390fef-7a7f-45bf-a081-f57ae835d4b6", ResourceVersion:"1607", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:48.148375 env[1333]: 2024-02-12 19:49:48.124 [INFO][3477] k8s.go 386: Calico CNI using IPs: [192.168.17.196/32] ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.149126 env[1333]: 2024-02-12 19:49:48.124 [INFO][3477] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.149126 env[1333]: 2024-02-12 19:49:48.137 [INFO][3477] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.149126 env[1333]: 2024-02-12 19:49:48.138 [INFO][3477] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.8.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"19390fef-7a7f-45bf-a081-f57ae835d4b6", ResourceVersion:"1607", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 49, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.8.13", ContainerID:"39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.196/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"7e:28:e0:01:36:6c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:49:48.149126 env[1333]: 2024-02-12 19:49:48.142 [INFO][3477] k8s.go 491: Wrote updated endpoint to datastore ContainerID="39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.8.13-k8s-test--pod--1-eth0" Feb 12 19:49:48.157000 audit[3508]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3508 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:49:48.157000 audit[3508]: SYSCALL arch=c000003e syscall=46 success=yes exit=19080 a0=3 a1=7ffd59e78960 a2=0 a3=7ffd59e7894c items=0 ppid=2633 pid=3508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.157000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:49:48.166053 env[1333]: time="2024-02-12T19:49:48.165924361Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:49:48.166053 env[1333]: time="2024-02-12T19:49:48.165967561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:49:48.166053 env[1333]: time="2024-02-12T19:49:48.165981361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:49:48.166705 env[1333]: time="2024-02-12T19:49:48.166622962Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a pid=3516 runtime=io.containerd.runc.v2 Feb 12 19:49:48.181468 systemd[1]: Started cri-containerd-39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a.scope. Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.196000 audit: BPF prog-id=118 op=LOAD Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3516 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339333338353830363139313535653063366464363036636232323963 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3516 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339333338353830363139313535653063366464363036636232323963 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit: BPF prog-id=119 op=LOAD Feb 12 19:49:48.198000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002cfec0 items=0 ppid=3516 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339333338353830363139313535653063366464363036636232323963 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit: BPF prog-id=120 op=LOAD Feb 12 19:49:48.198000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002cff08 items=0 ppid=3516 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339333338353830363139313535653063366464363036636232323963 Feb 12 19:49:48.198000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:49:48.198000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { perfmon } for pid=3526 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit[3526]: AVC avc: denied { bpf } for pid=3526 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.198000 audit: BPF prog-id=121 op=LOAD Feb 12 19:49:48.198000 audit[3526]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2318 items=0 ppid=3516 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339333338353830363139313535653063366464363036636232323963 Feb 12 19:49:48.230673 env[1333]: time="2024-02-12T19:49:48.230624271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:19390fef-7a7f-45bf-a081-f57ae835d4b6,Namespace:default,Attempt:0,} returns sandbox id \"39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a\"" Feb 12 19:49:48.232522 env[1333]: time="2024-02-12T19:49:48.232489374Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:49:48.411767 kubelet[1913]: E0212 19:49:48.411713 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:48.883640 env[1333]: time="2024-02-12T19:49:48.883507285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:48.895069 env[1333]: time="2024-02-12T19:49:48.895024605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:48.898958 env[1333]: time="2024-02-12T19:49:48.898917511Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:48.904241 env[1333]: time="2024-02-12T19:49:48.904204820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:49:48.904871 env[1333]: time="2024-02-12T19:49:48.904832221Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:3a8963c304a2f89d2bfa055e07403bae348b293c891b8ea01f7136642eaa277a\"" Feb 12 19:49:48.912675 env[1333]: time="2024-02-12T19:49:48.912639235Z" level=info msg="CreateContainer within sandbox \"39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:49:48.960803 env[1333]: time="2024-02-12T19:49:48.960747317Z" level=info msg="CreateContainer within sandbox \"39338580619155e0c6dd606cb229c9532d0c9ddfc2a05695a5e9121a56b2021a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"6e5f675c34c04a12db85ce0f652a0f93632b2ea9721863950f7bf6437d170fce\"" Feb 12 19:49:48.961471 env[1333]: time="2024-02-12T19:49:48.961396218Z" level=info msg="StartContainer for \"6e5f675c34c04a12db85ce0f652a0f93632b2ea9721863950f7bf6437d170fce\"" Feb 12 19:49:48.984022 systemd[1]: Started cri-containerd-6e5f675c34c04a12db85ce0f652a0f93632b2ea9721863950f7bf6437d170fce.scope. Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.996000 audit: BPF prog-id=122 op=LOAD Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3516 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665356636373563333463303461313264623835636530663635326130 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3516 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665356636373563333463303461313264623835636530663635326130 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit: BPF prog-id=123 op=LOAD Feb 12 19:49:48.997000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024c90 items=0 ppid=3516 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665356636373563333463303461313264623835636530663635326130 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit: BPF prog-id=124 op=LOAD Feb 12 19:49:48.997000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024cd8 items=0 ppid=3516 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665356636373563333463303461313264623835636530663635326130 Feb 12 19:49:48.997000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:49:48.997000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:49:48.997000 audit: BPF prog-id=125 op=LOAD Feb 12 19:49:48.997000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0000250e8 items=0 ppid=3516 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:49:48.997000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665356636373563333463303461313264623835636530663635326130 Feb 12 19:49:49.026120 env[1333]: time="2024-02-12T19:49:49.026064828Z" level=info msg="StartContainer for \"6e5f675c34c04a12db85ce0f652a0f93632b2ea9721863950f7bf6437d170fce\" returns successfully" Feb 12 19:49:49.412253 kubelet[1913]: E0212 19:49:49.412195 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:49.668642 kubelet[1913]: I0212 19:49:49.668302 1913 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=33.995236766 podCreationTimestamp="2024-02-12 19:49:15 +0000 UTC" firstStartedPulling="2024-02-12 19:49:48.232112773 +0000 UTC m=+81.277565701" lastFinishedPulling="2024-02-12 19:49:48.905150822 +0000 UTC m=+81.950603750" observedRunningTime="2024-02-12 19:49:49.668210315 +0000 UTC m=+82.713663243" watchObservedRunningTime="2024-02-12 19:49:49.668274815 +0000 UTC m=+82.713727743" Feb 12 19:49:49.982332 systemd-networkd[1470]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:49:50.412500 kubelet[1913]: E0212 19:49:50.412436 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:51.413296 kubelet[1913]: E0212 19:49:51.413245 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:51.483392 systemd[1]: run-containerd-runc-k8s.io-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f-runc.wuMis9.mount: Deactivated successfully. Feb 12 19:49:52.413750 kubelet[1913]: E0212 19:49:52.413690 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:53.414575 kubelet[1913]: E0212 19:49:53.414521 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:54.415320 kubelet[1913]: E0212 19:49:54.415258 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:55.416129 kubelet[1913]: E0212 19:49:55.416075 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:56.417263 kubelet[1913]: E0212 19:49:56.417200 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:57.418097 kubelet[1913]: E0212 19:49:57.418045 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:58.419241 kubelet[1913]: E0212 19:49:58.419180 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:49:59.419372 kubelet[1913]: E0212 19:49:59.419311 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:00.420157 kubelet[1913]: E0212 19:50:00.420099 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:01.421254 kubelet[1913]: E0212 19:50:01.421141 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:02.421916 kubelet[1913]: E0212 19:50:02.421854 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:03.422849 kubelet[1913]: E0212 19:50:03.422793 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:04.423083 kubelet[1913]: E0212 19:50:04.423022 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:05.424013 kubelet[1913]: E0212 19:50:05.423933 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:06.425131 kubelet[1913]: E0212 19:50:06.425069 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:07.336619 kubelet[1913]: E0212 19:50:07.336564 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:07.425958 kubelet[1913]: E0212 19:50:07.425898 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:08.426968 kubelet[1913]: E0212 19:50:08.426913 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:09.427494 kubelet[1913]: E0212 19:50:09.427455 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:10.427666 kubelet[1913]: E0212 19:50:10.427604 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:11.142445 kubelet[1913]: E0212 19:50:11.142221 1913 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:11.427846 kubelet[1913]: E0212 19:50:11.427715 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:11.634527 kubelet[1913]: E0212 19:50:11.634481 1913 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.8.36:35584->10.200.8.22:2379: read: connection timed out" Feb 12 19:50:12.428316 kubelet[1913]: E0212 19:50:12.428260 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:13.429406 kubelet[1913]: E0212 19:50:13.429346 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:14.430239 kubelet[1913]: E0212 19:50:14.430182 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:15.431360 kubelet[1913]: E0212 19:50:15.431314 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:16.432122 kubelet[1913]: E0212 19:50:16.432057 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:17.433224 kubelet[1913]: E0212 19:50:17.433158 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:18.434354 kubelet[1913]: E0212 19:50:18.434274 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:19.435346 kubelet[1913]: E0212 19:50:19.435285 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:20.435899 kubelet[1913]: E0212 19:50:20.435838 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:21.436911 kubelet[1913]: E0212 19:50:21.436828 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:21.481186 systemd[1]: run-containerd-runc-k8s.io-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f-runc.wZDm4m.mount: Deactivated successfully. Feb 12 19:50:21.635235 kubelet[1913]: E0212 19:50:21.635182 1913 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:22.437688 kubelet[1913]: E0212 19:50:22.437639 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:23.437878 kubelet[1913]: E0212 19:50:23.437818 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:24.438612 kubelet[1913]: E0212 19:50:24.438551 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:25.439424 kubelet[1913]: E0212 19:50:25.439364 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:26.439768 kubelet[1913]: E0212 19:50:26.439709 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:27.336720 kubelet[1913]: E0212 19:50:27.336666 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:27.440728 kubelet[1913]: E0212 19:50:27.440693 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:28.441660 kubelet[1913]: E0212 19:50:28.441603 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:29.441852 kubelet[1913]: E0212 19:50:29.441801 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:30.442980 kubelet[1913]: E0212 19:50:30.442914 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:31.443917 kubelet[1913]: E0212 19:50:31.443854 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:31.636377 kubelet[1913]: E0212 19:50:31.636338 1913 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:32.444062 kubelet[1913]: E0212 19:50:32.444008 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:33.444520 kubelet[1913]: E0212 19:50:33.444462 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:34.445375 kubelet[1913]: E0212 19:50:34.445319 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:35.446033 kubelet[1913]: E0212 19:50:35.445976 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:36.447453 kubelet[1913]: E0212 19:50:36.447396 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:37.448550 kubelet[1913]: E0212 19:50:37.448505 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:38.449427 kubelet[1913]: E0212 19:50:38.449370 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:39.450214 kubelet[1913]: E0212 19:50:39.450160 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:40.451107 kubelet[1913]: E0212 19:50:40.451051 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:41.451651 kubelet[1913]: E0212 19:50:41.451588 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:41.637131 kubelet[1913]: E0212 19:50:41.637088 1913 controller.go:193] "Failed to update lease" err="Put \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:41.637131 kubelet[1913]: I0212 19:50:41.637132 1913 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Feb 12 19:50:42.452009 kubelet[1913]: E0212 19:50:42.451952 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:43.452934 kubelet[1913]: E0212 19:50:43.452877 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:44.453455 kubelet[1913]: E0212 19:50:44.453395 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:45.454268 kubelet[1913]: E0212 19:50:45.454209 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:46.454872 kubelet[1913]: E0212 19:50:46.454815 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:47.336966 kubelet[1913]: E0212 19:50:47.336903 1913 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:47.455000 kubelet[1913]: E0212 19:50:47.454942 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:48.455532 kubelet[1913]: E0212 19:50:48.455476 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:49.456090 kubelet[1913]: E0212 19:50:49.456028 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:50.456539 kubelet[1913]: E0212 19:50:50.456480 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:50.857731 kubelet[1913]: E0212 19:50:50.857532 1913 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.8.13\": Get \"https://10.200.8.36:6443/api/v1/nodes/10.200.8.13?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:50:51.457209 kubelet[1913]: E0212 19:50:51.457158 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:51.479604 systemd[1]: run-containerd-runc-k8s.io-08be78506076911fb50dbb6840a8c9915f44aaee9cec71afc6cb0534522e255f-runc.G9QyQ1.mount: Deactivated successfully. Feb 12 19:50:51.587848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.600379 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.613216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.627981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.640933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.641395 kubelet[1913]: E0212 19:50:51.638306 1913 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.8.13?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Feb 12 19:50:51.654525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.660620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.681929 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.687356 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.687481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.687590 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.687698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.693085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.703813 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.704019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.704161 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.714690 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.725438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.745961 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.771656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.771852 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.772047 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.772234 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.772418 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.772592 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.788453 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.788812 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.788957 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.799228 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.799577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.809680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.809968 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.815291 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.825413 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.825698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.836671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.836940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.847315 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.868007 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.890331 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.890809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.911809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917066 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917221 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917362 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917622 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917752 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.917880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.918019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.918160 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.918289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.927074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.943003 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.943172 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.943311 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.943443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.958528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.958797 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.958933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.968527 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.979432 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.994765 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.994923 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.995069 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.995210 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:51.995357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.007056 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.017350 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.027711 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.043404 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.048801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.048950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.049100 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.049233 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.049365 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.049502 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.060817 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.061142 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.071187 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.092292 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.097802 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.097947 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.098110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.098248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.098380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.107980 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.108284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.119044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.119335 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.136083 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.162826 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.162987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.163136 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.163263 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.163402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.163532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.163662 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.178937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.179272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.179409 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.194405 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.199972 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.200147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.200284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.209933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.220908 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.226511 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.247541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.252570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.263467 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.273867 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274077 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274226 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274405 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274532 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274661 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274822 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.274984 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.285657 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.308519 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.334825 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335207 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335338 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335627 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.335885 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.336061 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.351037 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.366686 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381261 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.381938 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.389480 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.398311 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.398456 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.406247 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.417421 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.443426 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453220 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453388 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453527 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453660 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453789 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.453937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.454153 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.460014 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.502220 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.510328 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.510475 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.510612 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.510745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.510877 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.511021 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.511160 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.511293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.511423 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.511551 kubelet[1913]: E0212 19:50:52.460111 1913 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:50:52.520606 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.520918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.531444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.536952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.537130 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.547128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.557562 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.563197 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.563347 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.563482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.574138 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.612530 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618220 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618366 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618519 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618636 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618764 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.618892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.619037 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.619168 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.629178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.641749 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.641909 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.642062 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.651863 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.672611 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.677979 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.678138 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.678280 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.678417 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.678549 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.689008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.714464 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.724691 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730121 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730280 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730543 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730802 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.730931 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.740925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.741251 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.751366 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.784419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.784768 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.784909 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.785060 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.785193 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.785353 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.785485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.800922 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.828317 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.839449 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.839647 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.839777 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.839907 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.840072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.840209 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.840337 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.840464 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.855597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.882064 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.892615 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.892745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.892860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.892966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.893097 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.893205 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.893309 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.893414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.904693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.925711 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942222 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942362 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942493 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942747 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.942873 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.952378 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.952731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.964360 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.975193 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:52.996335 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.025416 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.025633 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.025765 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.025894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026048 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026439 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026565 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.026693 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.042308 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.069119 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.079521 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.079676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.079818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.079954 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.080094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.080233 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.080367 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.080497 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.095230 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.095594 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.095761 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.107817 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.135274 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.135661 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.135802 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.136015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.136155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.136283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.152262 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.183607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189053 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189218 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189352 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189483 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189612 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189743 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.189873 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.190013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.206366 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.206737 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.206876 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.218895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.235646 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.235866 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.236020 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.236156 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.246444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.246771 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.257694 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.280180 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.280336 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.280472 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.280606 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.280744 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.290249 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.305845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.306017 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.306157 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.306290 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.315832 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.341320 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.351441 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.356818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.356958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.357133 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.357265 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.357396 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.357506 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.357637 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.372412 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.372687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.372833 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.382906 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410168 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410496 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410632 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410760 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:50:53.410889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#219 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001