Feb 9 09:57:02.095194 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 09:57:02.095214 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 09:57:02.095222 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 09:57:02.095229 kernel: printk: bootconsole [pl11] enabled Feb 9 09:57:02.095234 kernel: efi: EFI v2.70 by EDK II Feb 9 09:57:02.095240 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3e198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 09:57:02.095246 kernel: random: crng init done Feb 9 09:57:02.095252 kernel: ACPI: Early table checksum verification disabled Feb 9 09:57:02.095257 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 09:57:02.095263 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095268 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095275 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 09:57:02.095281 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095286 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095293 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095299 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095305 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095312 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095318 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 09:57:02.095323 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 09:57:02.095329 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 09:57:02.095335 kernel: NUMA: Failed to initialise from firmware Feb 9 09:57:02.095341 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:57:02.095347 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 9 09:57:02.095352 kernel: Zone ranges: Feb 9 09:57:02.095358 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 09:57:02.095364 kernel: DMA32 empty Feb 9 09:57:02.095371 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:57:02.095376 kernel: Movable zone start for each node Feb 9 09:57:02.095382 kernel: Early memory node ranges Feb 9 09:57:02.095388 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 09:57:02.095394 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 09:57:02.095399 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 09:57:02.095405 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 09:57:02.095411 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 09:57:02.095416 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 09:57:02.095422 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 09:57:02.095428 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 09:57:02.095433 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 09:57:02.095441 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 09:57:02.095450 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 09:57:02.095456 kernel: psci: probing for conduit method from ACPI. Feb 9 09:57:02.095462 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 09:57:02.095468 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 09:57:02.095475 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 09:57:02.095481 kernel: psci: SMC Calling Convention v1.4 Feb 9 09:57:02.095488 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 09:57:02.095494 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 09:57:02.095500 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 09:57:02.095506 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 09:57:02.095512 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 09:57:02.095518 kernel: Detected PIPT I-cache on CPU0 Feb 9 09:57:02.095525 kernel: CPU features: detected: GIC system register CPU interface Feb 9 09:57:02.095531 kernel: CPU features: detected: Hardware dirty bit management Feb 9 09:57:02.095537 kernel: CPU features: detected: Spectre-BHB Feb 9 09:57:02.095543 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 09:57:02.095550 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 09:57:02.095557 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 09:57:02.095563 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 09:57:02.095569 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 09:57:02.095575 kernel: Policy zone: Normal Feb 9 09:57:02.095583 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:57:02.095590 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 09:57:02.095596 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 09:57:02.095602 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 09:57:02.095608 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 09:57:02.095616 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 09:57:02.095623 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 9 09:57:02.095629 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 09:57:02.095635 kernel: trace event string verifier disabled Feb 9 09:57:02.095641 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 09:57:02.095648 kernel: rcu: RCU event tracing is enabled. Feb 9 09:57:02.095654 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 09:57:02.095661 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 09:57:02.095667 kernel: Tracing variant of Tasks RCU enabled. Feb 9 09:57:02.095673 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 09:57:02.095679 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 09:57:02.095686 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 09:57:02.095692 kernel: GICv3: 960 SPIs implemented Feb 9 09:57:02.095698 kernel: GICv3: 0 Extended SPIs implemented Feb 9 09:57:02.095704 kernel: GICv3: Distributor has no Range Selector support Feb 9 09:57:02.095710 kernel: Root IRQ handler: gic_handle_irq Feb 9 09:57:02.095716 kernel: GICv3: 16 PPIs implemented Feb 9 09:57:02.095722 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 09:57:02.095729 kernel: ITS: No ITS available, not enabling LPIs Feb 9 09:57:02.095735 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:57:02.095741 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 09:57:02.095747 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 09:57:02.095753 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 09:57:02.095761 kernel: Console: colour dummy device 80x25 Feb 9 09:57:02.095768 kernel: printk: console [tty1] enabled Feb 9 09:57:02.095774 kernel: ACPI: Core revision 20210730 Feb 9 09:57:02.095781 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 09:57:02.095787 kernel: pid_max: default: 32768 minimum: 301 Feb 9 09:57:02.095793 kernel: LSM: Security Framework initializing Feb 9 09:57:02.095799 kernel: SELinux: Initializing. Feb 9 09:57:02.095806 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:57:02.095812 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 09:57:02.095820 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 09:57:02.095826 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 09:57:02.095832 kernel: rcu: Hierarchical SRCU implementation. Feb 9 09:57:02.095839 kernel: Remapping and enabling EFI services. Feb 9 09:57:02.095845 kernel: smp: Bringing up secondary CPUs ... Feb 9 09:57:02.095851 kernel: Detected PIPT I-cache on CPU1 Feb 9 09:57:02.095858 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 09:57:02.095864 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 09:57:02.095870 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 09:57:02.095878 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 09:57:02.095884 kernel: SMP: Total of 2 processors activated. Feb 9 09:57:02.095891 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 09:57:02.095897 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 09:57:02.095903 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 09:57:02.095910 kernel: CPU features: detected: CRC32 instructions Feb 9 09:57:02.095916 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 09:57:02.095922 kernel: CPU features: detected: LSE atomic instructions Feb 9 09:57:02.095929 kernel: CPU features: detected: Privileged Access Never Feb 9 09:57:02.095936 kernel: CPU: All CPU(s) started at EL1 Feb 9 09:57:02.095942 kernel: alternatives: patching kernel code Feb 9 09:57:02.095953 kernel: devtmpfs: initialized Feb 9 09:57:02.095961 kernel: KASLR enabled Feb 9 09:57:02.095967 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 09:57:02.095974 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 09:57:02.095981 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 09:57:02.095987 kernel: SMBIOS 3.1.0 present. Feb 9 09:57:02.095994 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 09:57:02.096001 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 09:57:02.096009 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 09:57:02.096016 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 09:57:02.096022 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 09:57:02.096029 kernel: audit: initializing netlink subsys (disabled) Feb 9 09:57:02.096036 kernel: audit: type=2000 audit(0.091:1): state=initialized audit_enabled=0 res=1 Feb 9 09:57:02.096042 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 09:57:02.096049 kernel: cpuidle: using governor menu Feb 9 09:57:02.096057 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 09:57:02.096063 kernel: ASID allocator initialised with 32768 entries Feb 9 09:57:02.096070 kernel: ACPI: bus type PCI registered Feb 9 09:57:02.096077 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 09:57:02.096083 kernel: Serial: AMBA PL011 UART driver Feb 9 09:57:02.096090 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 09:57:02.096097 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 09:57:02.096103 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 09:57:02.096110 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 09:57:02.096128 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 09:57:02.096134 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 09:57:02.096141 kernel: ACPI: Added _OSI(Module Device) Feb 9 09:57:02.096148 kernel: ACPI: Added _OSI(Processor Device) Feb 9 09:57:02.096154 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 09:57:02.096161 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 09:57:02.096168 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 09:57:02.096175 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 09:57:02.096182 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 09:57:02.096190 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 09:57:02.096197 kernel: ACPI: Interpreter enabled Feb 9 09:57:02.096203 kernel: ACPI: Using GIC for interrupt routing Feb 9 09:57:02.096210 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 09:57:02.096217 kernel: printk: console [ttyAMA0] enabled Feb 9 09:57:02.096224 kernel: printk: bootconsole [pl11] disabled Feb 9 09:57:02.096230 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 09:57:02.096237 kernel: iommu: Default domain type: Translated Feb 9 09:57:02.096244 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 09:57:02.096251 kernel: vgaarb: loaded Feb 9 09:57:02.096258 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 09:57:02.096265 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 09:57:02.096271 kernel: PTP clock support registered Feb 9 09:57:02.096278 kernel: Registered efivars operations Feb 9 09:57:02.096284 kernel: No ACPI PMU IRQ for CPU0 Feb 9 09:57:02.096291 kernel: No ACPI PMU IRQ for CPU1 Feb 9 09:57:02.096297 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 09:57:02.096304 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 09:57:02.096312 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 09:57:02.096319 kernel: pnp: PnP ACPI init Feb 9 09:57:02.096325 kernel: pnp: PnP ACPI: found 0 devices Feb 9 09:57:02.096332 kernel: NET: Registered PF_INET protocol family Feb 9 09:57:02.096339 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 09:57:02.096345 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 09:57:02.096352 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 09:57:02.096359 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 09:57:02.096366 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 09:57:02.096374 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 09:57:02.096381 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:57:02.096388 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 09:57:02.096395 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 09:57:02.096401 kernel: PCI: CLS 0 bytes, default 64 Feb 9 09:57:02.096408 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 09:57:02.096415 kernel: kvm [1]: HYP mode not available Feb 9 09:57:02.096421 kernel: Initialise system trusted keyrings Feb 9 09:57:02.096428 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 09:57:02.096436 kernel: Key type asymmetric registered Feb 9 09:57:02.096443 kernel: Asymmetric key parser 'x509' registered Feb 9 09:57:02.096449 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 09:57:02.096456 kernel: io scheduler mq-deadline registered Feb 9 09:57:02.096462 kernel: io scheduler kyber registered Feb 9 09:57:02.096469 kernel: io scheduler bfq registered Feb 9 09:57:02.096476 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 09:57:02.096482 kernel: thunder_xcv, ver 1.0 Feb 9 09:57:02.096489 kernel: thunder_bgx, ver 1.0 Feb 9 09:57:02.096497 kernel: nicpf, ver 1.0 Feb 9 09:57:02.096503 kernel: nicvf, ver 1.0 Feb 9 09:57:02.096619 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 09:57:02.096684 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T09:57:01 UTC (1707472621) Feb 9 09:57:02.096693 kernel: efifb: probing for efifb Feb 9 09:57:02.096700 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 09:57:02.096707 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 09:57:02.096713 kernel: efifb: scrolling: redraw Feb 9 09:57:02.096722 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 09:57:02.096729 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:57:02.096735 kernel: fb0: EFI VGA frame buffer device Feb 9 09:57:02.096742 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 09:57:02.096749 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 09:57:02.096756 kernel: NET: Registered PF_INET6 protocol family Feb 9 09:57:02.096762 kernel: Segment Routing with IPv6 Feb 9 09:57:02.096769 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 09:57:02.096776 kernel: NET: Registered PF_PACKET protocol family Feb 9 09:57:02.096784 kernel: Key type dns_resolver registered Feb 9 09:57:02.096790 kernel: registered taskstats version 1 Feb 9 09:57:02.096797 kernel: Loading compiled-in X.509 certificates Feb 9 09:57:02.096804 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 09:57:02.096811 kernel: Key type .fscrypt registered Feb 9 09:57:02.096817 kernel: Key type fscrypt-provisioning registered Feb 9 09:57:02.096824 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 09:57:02.096831 kernel: ima: Allocated hash algorithm: sha1 Feb 9 09:57:02.096837 kernel: ima: No architecture policies found Feb 9 09:57:02.096845 kernel: Freeing unused kernel memory: 34688K Feb 9 09:57:02.096852 kernel: Run /init as init process Feb 9 09:57:02.096858 kernel: with arguments: Feb 9 09:57:02.096865 kernel: /init Feb 9 09:57:02.096871 kernel: with environment: Feb 9 09:57:02.096878 kernel: HOME=/ Feb 9 09:57:02.096884 kernel: TERM=linux Feb 9 09:57:02.096891 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 09:57:02.096899 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:57:02.096909 systemd[1]: Detected virtualization microsoft. Feb 9 09:57:02.096917 systemd[1]: Detected architecture arm64. Feb 9 09:57:02.096924 systemd[1]: Running in initrd. Feb 9 09:57:02.096931 systemd[1]: No hostname configured, using default hostname. Feb 9 09:57:02.096938 systemd[1]: Hostname set to . Feb 9 09:57:02.096945 systemd[1]: Initializing machine ID from random generator. Feb 9 09:57:02.096952 systemd[1]: Queued start job for default target initrd.target. Feb 9 09:57:02.096961 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:57:02.096968 systemd[1]: Reached target cryptsetup.target. Feb 9 09:57:02.096975 systemd[1]: Reached target paths.target. Feb 9 09:57:02.096982 systemd[1]: Reached target slices.target. Feb 9 09:57:02.096989 systemd[1]: Reached target swap.target. Feb 9 09:57:02.096996 systemd[1]: Reached target timers.target. Feb 9 09:57:02.097004 systemd[1]: Listening on iscsid.socket. Feb 9 09:57:02.097011 systemd[1]: Listening on iscsiuio.socket. Feb 9 09:57:02.097019 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 09:57:02.097027 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 09:57:02.097034 systemd[1]: Listening on systemd-journald.socket. Feb 9 09:57:02.097041 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:57:02.097048 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:57:02.097055 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:57:02.097062 systemd[1]: Reached target sockets.target. Feb 9 09:57:02.097069 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:57:02.097077 systemd[1]: Finished network-cleanup.service. Feb 9 09:57:02.097085 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 09:57:02.097092 systemd[1]: Starting systemd-journald.service... Feb 9 09:57:02.097099 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:57:02.097107 systemd[1]: Starting systemd-resolved.service... Feb 9 09:57:02.097126 systemd-journald[276]: Journal started Feb 9 09:57:02.097169 systemd-journald[276]: Runtime Journal (/run/log/journal/834fbe0a9e9a43708386bfdffaf93be9) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:57:02.081533 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 09:57:02.129886 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 09:57:02.129942 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 09:57:02.145362 systemd[1]: Started systemd-journald.service. Feb 9 09:57:02.145431 kernel: Bridge firewalling registered Feb 9 09:57:02.145534 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 09:57:02.179400 kernel: audit: type=1130 audit(1707472622.152:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.179429 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:57:02.194441 kernel: SCSI subsystem initialized Feb 9 09:57:02.194464 kernel: audit: type=1130 audit(1707472622.189:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.186264 systemd-resolved[278]: Positive Trust Anchors: Feb 9 09:57:02.260490 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 09:57:02.260515 kernel: audit: type=1130 audit(1707472622.218:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.260526 kernel: device-mapper: uevent: version 1.0.3 Feb 9 09:57:02.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.186272 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:57:02.305288 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 09:57:02.305332 kernel: audit: type=1130 audit(1707472622.273:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.186299 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:57:02.375701 kernel: audit: type=1130 audit(1707472622.311:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.188415 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 09:57:02.189563 systemd[1]: Started systemd-resolved.service. Feb 9 09:57:02.218896 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 09:57:02.305164 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 09:57:02.311971 systemd[1]: Reached target nss-lookup.target. Feb 9 09:57:02.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.373544 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 09:57:02.483455 kernel: audit: type=1130 audit(1707472622.428:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.483486 kernel: audit: type=1130 audit(1707472622.459:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.381687 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 09:57:02.392781 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 09:57:02.417565 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:57:02.448812 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 09:57:02.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.484378 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:57:02.503914 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:57:02.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.513734 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 09:57:02.585980 kernel: audit: type=1130 audit(1707472622.513:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.586004 kernel: audit: type=1130 audit(1707472622.544:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.546012 systemd[1]: Starting dracut-cmdline.service... Feb 9 09:57:02.591588 dracut-cmdline[299]: dracut-dracut-053 Feb 9 09:57:02.598019 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 09:57:02.694146 kernel: Loading iSCSI transport class v2.0-870. Feb 9 09:57:02.706143 kernel: iscsi: registered transport (tcp) Feb 9 09:57:02.728242 kernel: iscsi: registered transport (qla4xxx) Feb 9 09:57:02.728299 kernel: QLogic iSCSI HBA Driver Feb 9 09:57:02.758748 systemd[1]: Finished dracut-cmdline.service. Feb 9 09:57:02.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:02.765976 systemd[1]: Starting dracut-pre-udev.service... Feb 9 09:57:02.821137 kernel: raid6: neonx8 gen() 13803 MB/s Feb 9 09:57:02.842131 kernel: raid6: neonx8 xor() 10826 MB/s Feb 9 09:57:02.865125 kernel: raid6: neonx4 gen() 13558 MB/s Feb 9 09:57:02.886129 kernel: raid6: neonx4 xor() 11137 MB/s Feb 9 09:57:02.907126 kernel: raid6: neonx2 gen() 12943 MB/s Feb 9 09:57:02.929125 kernel: raid6: neonx2 xor() 10348 MB/s Feb 9 09:57:02.950124 kernel: raid6: neonx1 gen() 10480 MB/s Feb 9 09:57:02.971124 kernel: raid6: neonx1 xor() 8796 MB/s Feb 9 09:57:02.993125 kernel: raid6: int64x8 gen() 6282 MB/s Feb 9 09:57:03.014124 kernel: raid6: int64x8 xor() 3544 MB/s Feb 9 09:57:03.035124 kernel: raid6: int64x4 gen() 7185 MB/s Feb 9 09:57:03.058125 kernel: raid6: int64x4 xor() 3851 MB/s Feb 9 09:57:03.079123 kernel: raid6: int64x2 gen() 6156 MB/s Feb 9 09:57:03.100125 kernel: raid6: int64x2 xor() 3321 MB/s Feb 9 09:57:03.122125 kernel: raid6: int64x1 gen() 5046 MB/s Feb 9 09:57:03.150346 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 09:57:03.150356 kernel: raid6: using algorithm neonx8 gen() 13803 MB/s Feb 9 09:57:03.150364 kernel: raid6: .... xor() 10826 MB/s, rmw enabled Feb 9 09:57:03.155486 kernel: raid6: using neon recovery algorithm Feb 9 09:57:03.175127 kernel: xor: measuring software checksum speed Feb 9 09:57:03.185041 kernel: 8regs : 17297 MB/sec Feb 9 09:57:03.185052 kernel: 32regs : 20749 MB/sec Feb 9 09:57:03.194695 kernel: arm64_neon : 27741 MB/sec Feb 9 09:57:03.194706 kernel: xor: using function: arm64_neon (27741 MB/sec) Feb 9 09:57:03.251131 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 09:57:03.261023 systemd[1]: Finished dracut-pre-udev.service. Feb 9 09:57:03.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:03.271000 audit: BPF prog-id=7 op=LOAD Feb 9 09:57:03.271000 audit: BPF prog-id=8 op=LOAD Feb 9 09:57:03.271956 systemd[1]: Starting systemd-udevd.service... Feb 9 09:57:03.291885 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 09:57:03.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:03.298768 systemd[1]: Started systemd-udevd.service. Feb 9 09:57:03.310953 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 09:57:03.325224 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 09:57:03.353246 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 09:57:03.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:03.360427 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:57:03.402207 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:57:03.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:03.458135 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 09:57:03.481193 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 09:57:03.481248 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 09:57:03.481258 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 09:57:03.481267 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 09:57:03.500798 kernel: scsi host0: storvsc_host_t Feb 9 09:57:03.529975 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 09:57:03.530053 kernel: scsi host1: storvsc_host_t Feb 9 09:57:03.530206 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 09:57:03.530217 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 09:57:03.530226 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 09:57:03.554144 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 09:57:03.579373 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 09:57:03.579609 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 09:57:03.587886 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 09:57:03.588090 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 09:57:03.593808 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 09:57:03.599210 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 09:57:03.609958 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 09:57:03.610103 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 09:57:03.618140 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:57:03.626141 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 09:57:03.725142 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (535) Feb 9 09:57:03.732296 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 09:57:03.753195 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:57:03.782658 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 09:57:03.801068 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 09:57:03.812656 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 09:57:03.823536 systemd[1]: Starting disk-uuid.service... Feb 9 09:57:03.848137 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:57:03.858146 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:57:04.867325 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 09:57:04.867379 disk-uuid[593]: The operation has completed successfully. Feb 9 09:57:04.929753 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 09:57:04.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:04.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:04.929853 systemd[1]: Finished disk-uuid.service. Feb 9 09:57:04.943608 systemd[1]: Starting verity-setup.service... Feb 9 09:57:04.976147 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 09:57:05.035231 systemd[1]: Found device dev-mapper-usr.device. Feb 9 09:57:05.041783 systemd[1]: Mounting sysusr-usr.mount... Feb 9 09:57:05.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.051434 systemd[1]: Finished verity-setup.service. Feb 9 09:57:05.118945 systemd[1]: Mounted sysusr-usr.mount. Feb 9 09:57:05.127995 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 09:57:05.123842 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 09:57:05.124669 systemd[1]: Starting ignition-setup.service... Feb 9 09:57:05.133682 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 09:57:05.179123 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:57:05.179184 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:57:05.184802 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:57:05.214444 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 09:57:05.244350 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 09:57:05.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.256000 audit: BPF prog-id=9 op=LOAD Feb 9 09:57:05.257274 systemd[1]: Starting systemd-networkd.service... Feb 9 09:57:05.277983 systemd[1]: Finished ignition-setup.service. Feb 9 09:57:05.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.290280 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 09:57:05.292592 systemd-networkd[838]: lo: Link UP Feb 9 09:57:05.292596 systemd-networkd[838]: lo: Gained carrier Feb 9 09:57:05.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.292959 systemd-networkd[838]: Enumeration completed Feb 9 09:57:05.295973 systemd-networkd[838]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:57:05.304794 systemd-networkd[838]: eth0: Link UP Feb 9 09:57:05.305402 systemd[1]: Started systemd-networkd.service. Feb 9 09:57:05.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.315249 systemd[1]: Reached target network.target. Feb 9 09:57:05.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.372591 iscsid[845]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:57:05.372591 iscsid[845]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 09:57:05.372591 iscsid[845]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 09:57:05.372591 iscsid[845]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 09:57:05.372591 iscsid[845]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 09:57:05.372591 iscsid[845]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 09:57:05.372591 iscsid[845]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 09:57:05.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.330373 systemd[1]: Starting iscsiuio.service... Feb 9 09:57:05.343942 systemd[1]: Started iscsiuio.service. Feb 9 09:57:05.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:05.354017 systemd[1]: Starting iscsid.service... Feb 9 09:57:05.363018 systemd[1]: Started iscsid.service. Feb 9 09:57:05.368726 systemd[1]: Starting dracut-initqueue.service... Feb 9 09:57:05.410243 systemd[1]: Finished dracut-initqueue.service. Feb 9 09:57:05.416176 systemd[1]: Reached target remote-fs-pre.target. Feb 9 09:57:05.422028 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:57:05.443335 systemd[1]: Reached target remote-fs.target. Feb 9 09:57:05.462029 systemd[1]: Starting dracut-pre-mount.service... Feb 9 09:57:05.488092 systemd[1]: Finished dracut-pre-mount.service. Feb 9 09:57:06.031977 ignition[841]: Ignition 2.14.0 Feb 9 09:57:06.031988 ignition[841]: Stage: fetch-offline Feb 9 09:57:06.032042 ignition[841]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:06.032065 ignition[841]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:06.068892 ignition[841]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:06.075403 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 09:57:06.116216 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 09:57:06.116243 kernel: audit: type=1130 audit(1707472626.082:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.082000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.069040 ignition[841]: parsed url from cmdline: "" Feb 9 09:57:06.083618 systemd[1]: Starting ignition-fetch.service... Feb 9 09:57:06.069043 ignition[841]: no config URL provided Feb 9 09:57:06.069049 ignition[841]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:57:06.142539 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:57:06.069057 ignition[841]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:57:06.135573 systemd-networkd[838]: eth0: Gained carrier Feb 9 09:57:06.069062 ignition[841]: failed to fetch config: resource requires networking Feb 9 09:57:06.069340 ignition[841]: Ignition finished successfully Feb 9 09:57:06.104358 ignition[864]: Ignition 2.14.0 Feb 9 09:57:06.104365 ignition[864]: Stage: fetch Feb 9 09:57:06.104486 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:06.104514 ignition[864]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:06.107536 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:06.123744 ignition[864]: parsed url from cmdline: "" Feb 9 09:57:06.123753 ignition[864]: no config URL provided Feb 9 09:57:06.123762 ignition[864]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 09:57:06.194182 systemd-networkd[838]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:57:06.123775 ignition[864]: no config at "/usr/lib/ignition/user.ign" Feb 9 09:57:06.123818 ignition[864]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 09:57:06.124978 ignition[864]: GET error: Get "http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text": dial tcp 169.254.169.254:80: connect: network is unreachable Feb 9 09:57:06.326076 ignition[864]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #2 Feb 9 09:57:06.415176 ignition[864]: GET result: OK Feb 9 09:57:06.415256 ignition[864]: config has been read from IMDS userdata Feb 9 09:57:06.415301 ignition[864]: parsing config with SHA512: cf119ac5fab34882bd2725a1c45ccae4483cc78cfbf56f400aa4665d4a950191db252b8c7f312078476915f4aba8e31f9d1fe7182c886d672c3d077ba9d50de6 Feb 9 09:57:06.437289 unknown[864]: fetched base config from "system" Feb 9 09:57:06.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.437773 ignition[864]: fetch: fetch complete Feb 9 09:57:06.477226 kernel: audit: type=1130 audit(1707472626.448:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.437301 unknown[864]: fetched base config from "system" Feb 9 09:57:06.437778 ignition[864]: fetch: fetch passed Feb 9 09:57:06.437307 unknown[864]: fetched user config from "azure" Feb 9 09:57:06.518619 kernel: audit: type=1130 audit(1707472626.491:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.437821 ignition[864]: Ignition finished successfully Feb 9 09:57:06.443026 systemd[1]: Finished ignition-fetch.service. Feb 9 09:57:06.479295 ignition[870]: Ignition 2.14.0 Feb 9 09:57:06.577137 kernel: audit: type=1130 audit(1707472626.534:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.450078 systemd[1]: Starting ignition-kargs.service... Feb 9 09:57:06.479302 ignition[870]: Stage: kargs Feb 9 09:57:06.486450 systemd[1]: Finished ignition-kargs.service. Feb 9 09:57:06.479423 ignition[870]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:06.492648 systemd[1]: Starting ignition-disks.service... Feb 9 09:57:06.479442 ignition[870]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:06.529334 systemd[1]: Finished ignition-disks.service. Feb 9 09:57:06.482311 ignition[870]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:06.534679 systemd[1]: Reached target initrd-root-device.target. Feb 9 09:57:06.484665 ignition[870]: kargs: kargs passed Feb 9 09:57:06.566885 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:57:06.484718 ignition[870]: Ignition finished successfully Feb 9 09:57:06.572360 systemd[1]: Reached target local-fs.target. Feb 9 09:57:06.503047 ignition[876]: Ignition 2.14.0 Feb 9 09:57:06.577424 systemd[1]: Reached target sysinit.target. Feb 9 09:57:06.503054 ignition[876]: Stage: disks Feb 9 09:57:06.587471 systemd[1]: Reached target basic.target. Feb 9 09:57:06.503183 ignition[876]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:06.600446 systemd[1]: Starting systemd-fsck-root.service... Feb 9 09:57:06.503202 ignition[876]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:06.685776 systemd-fsck[884]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 09:57:06.505981 ignition[876]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:06.524446 ignition[876]: disks: disks passed Feb 9 09:57:06.524515 ignition[876]: Ignition finished successfully Feb 9 09:57:06.710856 systemd[1]: Finished systemd-fsck-root.service. Feb 9 09:57:06.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.739941 systemd[1]: Mounting sysroot.mount... Feb 9 09:57:06.750714 kernel: audit: type=1130 audit(1707472626.717:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:06.765133 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 09:57:06.765752 systemd[1]: Mounted sysroot.mount. Feb 9 09:57:06.770530 systemd[1]: Reached target initrd-root-fs.target. Feb 9 09:57:06.788800 systemd[1]: Mounting sysroot-usr.mount... Feb 9 09:57:06.799635 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 09:57:06.811848 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 09:57:06.811892 systemd[1]: Reached target ignition-diskful.target. Feb 9 09:57:06.830299 systemd[1]: Mounted sysroot-usr.mount. Feb 9 09:57:06.847287 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:57:06.857970 systemd[1]: Starting initrd-setup-root.service... Feb 9 09:57:06.879854 initrd-setup-root[899]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 09:57:06.900211 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (894) Feb 9 09:57:06.900240 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:57:06.900249 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:57:06.907549 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:57:06.909655 initrd-setup-root[911]: cut: /sysroot/etc/group: No such file or directory Feb 9 09:57:06.920871 initrd-setup-root[931]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 09:57:06.933652 initrd-setup-root[941]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 09:57:06.932624 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:57:07.056317 systemd[1]: Finished initrd-setup-root.service. Feb 9 09:57:07.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.063237 systemd[1]: Starting ignition-mount.service... Feb 9 09:57:07.092914 kernel: audit: type=1130 audit(1707472627.062:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.101555 systemd[1]: Starting sysroot-boot.service... Feb 9 09:57:07.115407 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 09:57:07.115541 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 09:57:07.136768 ignition[962]: INFO : Ignition 2.14.0 Feb 9 09:57:07.136768 ignition[962]: INFO : Stage: mount Feb 9 09:57:07.154244 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:07.154244 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:07.154244 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:07.154244 ignition[962]: INFO : mount: mount passed Feb 9 09:57:07.154244 ignition[962]: INFO : Ignition finished successfully Feb 9 09:57:07.242038 kernel: audit: type=1130 audit(1707472627.155:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.242064 kernel: audit: type=1130 audit(1707472627.189:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.147895 systemd[1]: Finished sysroot-boot.service. Feb 9 09:57:07.181842 systemd[1]: Finished ignition-mount.service. Feb 9 09:57:07.310170 coreos-metadata[893]: Feb 09 09:57:07.310 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 09:57:07.320950 coreos-metadata[893]: Feb 09 09:57:07.320 INFO Fetch successful Feb 9 09:57:07.353423 coreos-metadata[893]: Feb 09 09:57:07.353 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 09:57:07.380618 coreos-metadata[893]: Feb 09 09:57:07.380 INFO Fetch successful Feb 9 09:57:07.386918 coreos-metadata[893]: Feb 09 09:57:07.386 INFO wrote hostname ci-3510.3.2-a-67daabce87 to /sysroot/etc/hostname Feb 9 09:57:07.397533 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 09:57:07.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.404618 systemd[1]: Starting ignition-files.service... Feb 9 09:57:07.441284 kernel: audit: type=1130 audit(1707472627.403:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:07.439760 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 09:57:07.466134 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (972) Feb 9 09:57:07.479982 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 09:57:07.480024 kernel: BTRFS info (device sda6): using free space tree Feb 9 09:57:07.485212 kernel: BTRFS info (device sda6): has skinny extents Feb 9 09:57:07.489356 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 09:57:07.506698 ignition[991]: INFO : Ignition 2.14.0 Feb 9 09:57:07.506698 ignition[991]: INFO : Stage: files Feb 9 09:57:07.516960 ignition[991]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:07.516960 ignition[991]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:07.516960 ignition[991]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:07.516960 ignition[991]: DEBUG : files: compiled without relabeling support, skipping Feb 9 09:57:07.556257 ignition[991]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 09:57:07.556257 ignition[991]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 09:57:07.578916 ignition[991]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 09:57:07.587743 ignition[991]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 09:57:07.596207 ignition[991]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 09:57:07.596180 unknown[991]: wrote ssh authorized keys file for user: core Feb 9 09:57:07.618025 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:57:07.618025 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 09:57:07.649575 kernel: hv_netvsc 002248c2-18bc-0022-48c2-18bc002248c2 eth0: VF slot 1 added Feb 9 09:57:07.649744 kernel: hv_vmbus: registering driver hv_pci Feb 9 09:57:07.619851 systemd-networkd[838]: eth0: Gained IPv6LL Feb 9 09:57:07.669457 kernel: hv_pci 1e6452d0-fa06-4e94-b53a-efde32ef150b: PCI VMBus probing: Using version 0x10004 Feb 9 09:57:07.681651 kernel: hv_pci 1e6452d0-fa06-4e94-b53a-efde32ef150b: PCI host bridge to bus fa06:00 Feb 9 09:57:07.689666 kernel: pci_bus fa06:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 09:57:07.698009 kernel: pci_bus fa06:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 09:57:07.707246 kernel: pci fa06:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 09:57:07.721651 kernel: pci fa06:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:57:07.746234 kernel: pci fa06:00:02.0: enabling Extended Tags Feb 9 09:57:07.775752 kernel: pci fa06:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at fa06:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 09:57:07.775928 kernel: pci_bus fa06:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 09:57:07.776015 kernel: pci fa06:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 09:57:07.827135 kernel: mlx5_core fa06:00:02.0: firmware version: 16.30.1284 Feb 9 09:57:07.987136 kernel: mlx5_core fa06:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 09:57:08.012365 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 09:57:08.051139 kernel: hv_netvsc 002248c2-18bc-0022-48c2-18bc002248c2 eth0: VF registering: eth1 Feb 9 09:57:08.051705 kernel: mlx5_core fa06:00:02.0 eth1: joined to eth0 Feb 9 09:57:08.075146 kernel: mlx5_core fa06:00:02.0 enP64006s1: renamed from eth1 Feb 9 09:57:08.078304 systemd-networkd[838]: eth1: Interface name change detected, renamed to enP64006s1. Feb 9 09:57:08.205144 kernel: mlx5_core fa06:00:02.0 enP64006s1: Link up Feb 9 09:57:08.204658 systemd-networkd[838]: enP64006s1: Link UP Feb 9 09:57:08.250270 kernel: hv_netvsc 002248c2-18bc-0022-48c2-18bc002248c2 eth0: Data path switched to VF: enP64006s1 Feb 9 09:57:08.249907 systemd-networkd[838]: enP64006s1: Gained carrier Feb 9 09:57:08.331205 ignition[991]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 09:57:08.350757 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 09:57:08.350757 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:57:08.350757 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 09:57:08.606559 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 09:57:08.739337 ignition[991]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 09:57:08.759143 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 09:57:08.759143 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:57:08.759143 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 9 09:57:08.995523 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 09:57:09.308821 ignition[991]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 9 09:57:09.328197 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 09:57:09.328197 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:57:09.328197 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 9 09:57:09.395736 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 09:57:10.023293 ignition[991]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:57:10.045495 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:57:10.206709 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (991) Feb 9 09:57:10.206734 kernel: audit: type=1130 audit(1707472630.152:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.152000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1844055348" Feb 9 09:57:10.206789 ignition[991]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1844055348": device or resource busy Feb 9 09:57:10.206789 ignition[991]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1844055348", trying btrfs: device or resource busy Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1844055348" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1844055348" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1844055348" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1844055348" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem60570919" Feb 9 09:57:10.206789 ignition[991]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem60570919": device or resource busy Feb 9 09:57:10.206789 ignition[991]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem60570919", trying btrfs: device or resource busy Feb 9 09:57:10.206789 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem60570919" Feb 9 09:57:10.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.096472 systemd[1]: mnt-oem1844055348.mount: Deactivated successfully. Feb 9 09:57:10.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.476216 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem60570919" Feb 9 09:57:10.476216 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem60570919" Feb 9 09:57:10.476216 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem60570919" Feb 9 09:57:10.476216 ignition[991]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 09:57:10.476216 ignition[991]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 09:57:10.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.137276 systemd[1]: mnt-oem60570919.mount: Deactivated successfully. Feb 9 09:57:10.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.812274 ignition[991]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:57:10.812274 ignition[991]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 09:57:10.812274 ignition[991]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 09:57:10.812274 ignition[991]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 09:57:10.812274 ignition[991]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:57:10.812274 ignition[991]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 09:57:10.812274 ignition[991]: INFO : files: files passed Feb 9 09:57:10.812274 ignition[991]: INFO : Ignition finished successfully Feb 9 09:57:10.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.140878 systemd[1]: Finished ignition-files.service. Feb 9 09:57:10.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.967834 initrd-setup-root-after-ignition[1027]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 09:57:10.972000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.153901 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 09:57:10.191648 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 09:57:10.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.205632 systemd[1]: Starting ignition-quench.service... Feb 9 09:57:10.227379 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 09:57:10.227481 systemd[1]: Finished ignition-quench.service. Feb 9 09:57:10.250029 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 09:57:10.257653 systemd[1]: Reached target ignition-complete.target. Feb 9 09:57:11.062554 ignition[1040]: INFO : Ignition 2.14.0 Feb 9 09:57:11.062554 ignition[1040]: INFO : Stage: umount Feb 9 09:57:11.062554 ignition[1040]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 09:57:11.062554 ignition[1040]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 09:57:11.062554 ignition[1040]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 09:57:11.062554 ignition[1040]: INFO : umount: umount passed Feb 9 09:57:11.062554 ignition[1040]: INFO : Ignition finished successfully Feb 9 09:57:11.188015 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 9 09:57:11.188041 kernel: audit: type=1130 audit(1707472631.132:61): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.188053 kernel: audit: type=1131 audit(1707472631.163:62): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.282186 systemd[1]: Starting initrd-parse-etc.service... Feb 9 09:57:11.218138 kernel: audit: type=1131 audit(1707472631.194:63): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.194000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.316955 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 09:57:10.317081 systemd[1]: Finished initrd-parse-etc.service. Feb 9 09:57:11.254831 kernel: audit: type=1131 audit(1707472631.232:64): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.332781 systemd[1]: Reached target initrd-fs.target. Feb 9 09:57:11.285379 kernel: audit: type=1131 audit(1707472631.260:65): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.349977 systemd[1]: Reached target initrd.target. Feb 9 09:57:10.368464 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 09:57:11.260000 audit: BPF prog-id=6 op=UNLOAD Feb 9 09:57:10.369409 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 09:57:11.344316 kernel: audit: type=1334 audit(1707472631.260:66): prog-id=6 op=UNLOAD Feb 9 09:57:11.344341 kernel: audit: type=1131 audit(1707472631.300:67): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.300000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.451674 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 09:57:11.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.470900 systemd[1]: Starting initrd-cleanup.service... Feb 9 09:57:10.500765 systemd[1]: Stopped target nss-lookup.target. Feb 9 09:57:11.407359 kernel: audit: type=1131 audit(1707472631.349:68): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.407393 kernel: audit: type=1131 audit(1707472631.385:69): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.515712 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 09:57:10.535915 systemd[1]: Stopped target timers.target. Feb 9 09:57:11.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.553336 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 09:57:11.453725 kernel: audit: type=1131 audit(1707472631.420:70): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.553455 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 09:57:10.566948 systemd[1]: Stopped target initrd.target. Feb 9 09:57:10.580697 systemd[1]: Stopped target basic.target. Feb 9 09:57:10.594018 systemd[1]: Stopped target ignition-complete.target. Feb 9 09:57:11.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.607539 systemd[1]: Stopped target ignition-diskful.target. Feb 9 09:57:10.623384 systemd[1]: Stopped target initrd-root-device.target. Feb 9 09:57:10.643632 systemd[1]: Stopped target remote-fs.target. Feb 9 09:57:11.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.664738 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 09:57:11.536212 kernel: hv_netvsc 002248c2-18bc-0022-48c2-18bc002248c2 eth0: Data path switched from VF: enP64006s1 Feb 9 09:57:11.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.680540 systemd[1]: Stopped target sysinit.target. Feb 9 09:57:11.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.695968 systemd[1]: Stopped target local-fs.target. Feb 9 09:57:10.714526 systemd[1]: Stopped target local-fs-pre.target. Feb 9 09:57:10.733414 systemd[1]: Stopped target swap.target. Feb 9 09:57:10.747210 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 09:57:11.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.747324 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 09:57:11.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:11.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.761885 systemd[1]: Stopped target cryptsetup.target. Feb 9 09:57:10.776406 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 09:57:10.776515 systemd[1]: Stopped dracut-initqueue.service. Feb 9 09:57:10.790838 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 09:57:10.790944 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 09:57:10.806329 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 09:57:10.806435 systemd[1]: Stopped ignition-files.service. Feb 9 09:57:10.817683 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 09:57:10.817784 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 09:57:10.834610 systemd[1]: Stopping ignition-mount.service... Feb 9 09:57:10.850163 systemd[1]: Stopping iscsiuio.service... Feb 9 09:57:10.854725 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 09:57:10.854929 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 09:57:10.875058 systemd[1]: Stopping sysroot-boot.service... Feb 9 09:57:10.890967 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 09:57:10.891157 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 09:57:10.897595 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 09:57:11.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:10.897698 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 09:57:10.920731 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 09:57:10.920856 systemd[1]: Stopped iscsiuio.service. Feb 9 09:57:10.936931 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 09:57:10.937668 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 09:57:10.937767 systemd[1]: Stopped ignition-mount.service. Feb 9 09:57:10.948426 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 09:57:10.948498 systemd[1]: Stopped ignition-disks.service. Feb 9 09:57:10.957558 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 09:57:10.957609 systemd[1]: Stopped ignition-kargs.service. Feb 9 09:57:11.770436 iscsid[845]: iscsid shutting down. Feb 9 09:57:10.963202 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 09:57:10.963243 systemd[1]: Stopped ignition-fetch.service. Feb 9 09:57:10.972879 systemd[1]: Stopped target network.target. Feb 9 09:57:10.988100 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 09:57:10.988160 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 09:57:11.000122 systemd[1]: Stopped target paths.target. Feb 9 09:57:11.017469 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 09:57:11.028148 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 09:57:11.035194 systemd[1]: Stopped target slices.target. Feb 9 09:57:11.045389 systemd[1]: Stopped target sockets.target. Feb 9 09:57:11.056999 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 09:57:11.057040 systemd[1]: Closed iscsid.socket. Feb 9 09:57:11.067026 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 09:57:11.067059 systemd[1]: Closed iscsiuio.socket. Feb 9 09:57:11.075877 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 09:57:11.075921 systemd[1]: Stopped ignition-setup.service. Feb 9 09:57:11.085829 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:57:11.098810 systemd[1]: Stopping systemd-resolved.service... Feb 9 09:57:11.119503 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 09:57:11.119595 systemd[1]: Finished initrd-cleanup.service. Feb 9 09:57:11.126546 systemd-networkd[838]: eth0: DHCPv6 lease lost Feb 9 09:57:11.770000 audit: BPF prog-id=9 op=UNLOAD Feb 9 09:57:11.771131 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 09:57:11.164316 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 09:57:11.164414 systemd[1]: Stopped systemd-resolved.service. Feb 9 09:57:11.220816 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:57:11.220921 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:57:11.232576 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 09:57:11.232661 systemd[1]: Stopped sysroot-boot.service. Feb 9 09:57:11.261433 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 09:57:11.261475 systemd[1]: Closed systemd-networkd.socket. Feb 9 09:57:11.290672 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 09:57:11.290729 systemd[1]: Stopped initrd-setup-root.service. Feb 9 09:57:11.315160 systemd[1]: Stopping network-cleanup.service... Feb 9 09:57:11.339365 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 09:57:11.339444 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 09:57:11.375226 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 09:57:11.375290 systemd[1]: Stopped systemd-sysctl.service. Feb 9 09:57:11.410035 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 09:57:11.410096 systemd[1]: Stopped systemd-modules-load.service. Feb 9 09:57:11.448132 systemd[1]: Stopping systemd-udevd.service... Feb 9 09:57:11.459241 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 09:57:11.468883 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 09:57:11.469035 systemd[1]: Stopped systemd-udevd.service. Feb 9 09:57:11.478761 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 09:57:11.478802 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 09:57:11.489524 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 09:57:11.489565 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 09:57:11.500039 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 09:57:11.500088 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 09:57:11.511094 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 09:57:11.511147 systemd[1]: Stopped dracut-cmdline.service. Feb 9 09:57:11.531378 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 09:57:11.531434 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 09:57:11.546053 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 09:57:11.562557 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 09:57:11.562637 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 09:57:11.573199 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 09:57:11.573302 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 09:57:11.678616 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 09:57:11.678726 systemd[1]: Stopped network-cleanup.service. Feb 9 09:57:11.689292 systemd[1]: Reached target initrd-switch-root.target. Feb 9 09:57:11.703661 systemd[1]: Starting initrd-switch-root.service... Feb 9 09:57:11.723010 systemd[1]: Switching root. Feb 9 09:57:11.772158 systemd-journald[276]: Journal stopped Feb 9 09:57:36.656082 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 09:57:36.656103 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 09:57:36.656125 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 09:57:36.656137 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 09:57:36.656145 kernel: SELinux: policy capability open_perms=1 Feb 9 09:57:36.656153 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 09:57:36.656162 kernel: SELinux: policy capability always_check_network=0 Feb 9 09:57:36.656171 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 09:57:36.656180 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 09:57:36.656188 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 09:57:36.656197 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 09:57:36.656207 systemd[1]: Successfully loaded SELinux policy in 702.443ms. Feb 9 09:57:36.656218 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 295.780ms. Feb 9 09:57:36.656228 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 09:57:36.656240 systemd[1]: Detected virtualization microsoft. Feb 9 09:57:36.656249 systemd[1]: Detected architecture arm64. Feb 9 09:57:36.656259 systemd[1]: Detected first boot. Feb 9 09:57:36.656269 systemd[1]: Hostname set to . Feb 9 09:57:36.656278 systemd[1]: Initializing machine ID from random generator. Feb 9 09:57:36.656287 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 9 09:57:36.656296 kernel: audit: type=1400 audit(1707472637.303:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:57:36.656306 kernel: audit: type=1400 audit(1707472637.303:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:57:36.656316 kernel: audit: type=1334 audit(1707472637.308:83): prog-id=10 op=LOAD Feb 9 09:57:36.656325 kernel: audit: type=1334 audit(1707472637.308:84): prog-id=10 op=UNLOAD Feb 9 09:57:36.656333 kernel: audit: type=1334 audit(1707472637.327:85): prog-id=11 op=LOAD Feb 9 09:57:36.656342 kernel: audit: type=1334 audit(1707472637.327:86): prog-id=11 op=UNLOAD Feb 9 09:57:36.656351 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 09:57:36.656361 kernel: audit: type=1400 audit(1707472642.614:87): avc: denied { associate } for pid=1074 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:57:36.656372 kernel: audit: type=1300 audit(1707472642.614:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:36.656382 kernel: audit: type=1327 audit(1707472642.614:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:57:36.656391 kernel: audit: type=1400 audit(1707472642.625:88): avc: denied { associate } for pid=1074 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:57:36.656401 kernel: audit: type=1300 audit(1707472642.625:88): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:36.656410 kernel: audit: type=1307 audit(1707472642.625:88): cwd="/" Feb 9 09:57:36.656419 kernel: audit: type=1302 audit(1707472642.625:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:36.656429 kernel: audit: type=1302 audit(1707472642.625:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:36.656439 kernel: audit: type=1327 audit(1707472642.625:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:57:36.656449 systemd[1]: Populated /etc with preset unit settings. Feb 9 09:57:36.656459 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:57:36.656469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:57:36.656479 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:57:36.656490 kernel: audit: type=1334 audit(1707472655.458:89): prog-id=12 op=LOAD Feb 9 09:57:36.656500 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 09:57:36.656510 kernel: audit: type=1334 audit(1707472655.458:90): prog-id=3 op=UNLOAD Feb 9 09:57:36.656519 systemd[1]: Stopped iscsid.service. Feb 9 09:57:36.656529 kernel: audit: type=1334 audit(1707472655.458:91): prog-id=13 op=LOAD Feb 9 09:57:36.656537 kernel: audit: type=1334 audit(1707472655.458:92): prog-id=14 op=LOAD Feb 9 09:57:36.656546 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 09:57:36.656556 kernel: audit: type=1334 audit(1707472655.458:93): prog-id=4 op=UNLOAD Feb 9 09:57:36.656565 systemd[1]: Stopped initrd-switch-root.service. Feb 9 09:57:36.656575 kernel: audit: type=1334 audit(1707472655.458:94): prog-id=5 op=UNLOAD Feb 9 09:57:36.656584 kernel: audit: type=1334 audit(1707472655.459:95): prog-id=15 op=LOAD Feb 9 09:57:36.656593 kernel: audit: type=1334 audit(1707472655.459:96): prog-id=12 op=UNLOAD Feb 9 09:57:36.656602 kernel: audit: type=1334 audit(1707472655.459:97): prog-id=16 op=LOAD Feb 9 09:57:36.656612 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 09:57:36.656621 kernel: audit: type=1334 audit(1707472655.459:98): prog-id=17 op=LOAD Feb 9 09:57:36.656630 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 09:57:36.656640 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 09:57:36.656649 systemd[1]: Created slice system-getty.slice. Feb 9 09:57:36.656660 systemd[1]: Created slice system-modprobe.slice. Feb 9 09:57:36.656670 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 09:57:36.656679 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 09:57:36.656689 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 09:57:36.656699 systemd[1]: Created slice user.slice. Feb 9 09:57:36.656708 systemd[1]: Started systemd-ask-password-console.path. Feb 9 09:57:36.656717 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 09:57:36.656727 systemd[1]: Set up automount boot.automount. Feb 9 09:57:36.656737 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 09:57:36.656747 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 09:57:36.656756 systemd[1]: Stopped target initrd-fs.target. Feb 9 09:57:36.656766 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 09:57:36.656776 systemd[1]: Reached target integritysetup.target. Feb 9 09:57:36.656785 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 09:57:36.656795 systemd[1]: Reached target remote-fs.target. Feb 9 09:57:36.656804 systemd[1]: Reached target slices.target. Feb 9 09:57:36.656814 systemd[1]: Reached target swap.target. Feb 9 09:57:36.656824 systemd[1]: Reached target torcx.target. Feb 9 09:57:36.656834 systemd[1]: Reached target veritysetup.target. Feb 9 09:57:36.656844 systemd[1]: Listening on systemd-coredump.socket. Feb 9 09:57:36.656854 systemd[1]: Listening on systemd-initctl.socket. Feb 9 09:57:36.656865 systemd[1]: Listening on systemd-networkd.socket. Feb 9 09:57:36.656875 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 09:57:36.656884 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 09:57:36.656894 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 09:57:36.656904 systemd[1]: Mounting dev-hugepages.mount... Feb 9 09:57:36.656913 systemd[1]: Mounting dev-mqueue.mount... Feb 9 09:57:36.656923 systemd[1]: Mounting media.mount... Feb 9 09:57:36.656932 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 09:57:36.656942 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 09:57:36.656952 systemd[1]: Mounting tmp.mount... Feb 9 09:57:36.656963 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 09:57:36.656973 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 09:57:36.656983 systemd[1]: Starting kmod-static-nodes.service... Feb 9 09:57:36.656992 systemd[1]: Starting modprobe@configfs.service... Feb 9 09:57:36.657002 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 09:57:36.657012 systemd[1]: Starting modprobe@drm.service... Feb 9 09:57:36.657021 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 09:57:36.657031 systemd[1]: Starting modprobe@fuse.service... Feb 9 09:57:36.657042 systemd[1]: Starting modprobe@loop.service... Feb 9 09:57:36.657052 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 09:57:36.657062 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 09:57:36.657071 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 09:57:36.657081 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 09:57:36.657091 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 09:57:36.657101 systemd[1]: Stopped systemd-journald.service. Feb 9 09:57:36.657110 systemd[1]: systemd-journald.service: Consumed 3.668s CPU time. Feb 9 09:57:36.657128 systemd[1]: Starting systemd-journald.service... Feb 9 09:57:36.657138 systemd[1]: Starting systemd-modules-load.service... Feb 9 09:57:36.657150 systemd[1]: Starting systemd-network-generator.service... Feb 9 09:57:36.657160 systemd[1]: Starting systemd-remount-fs.service... Feb 9 09:57:36.657169 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 09:57:36.657179 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 09:57:36.657188 systemd[1]: Stopped verity-setup.service. Feb 9 09:57:36.657198 systemd[1]: Mounted dev-hugepages.mount. Feb 9 09:57:36.657207 systemd[1]: Mounted dev-mqueue.mount. Feb 9 09:57:36.657218 systemd[1]: Mounted media.mount. Feb 9 09:57:36.657228 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 09:57:36.657237 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 09:57:36.657246 systemd[1]: Mounted tmp.mount. Feb 9 09:57:36.657259 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 09:57:36.657270 systemd[1]: Finished kmod-static-nodes.service. Feb 9 09:57:36.657279 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 09:57:36.657289 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 09:57:36.657298 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 09:57:36.657308 systemd[1]: Finished modprobe@drm.service. Feb 9 09:57:36.657318 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 09:57:36.657329 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 09:57:36.657339 kernel: loop: module loaded Feb 9 09:57:36.657348 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 09:57:36.657359 systemd[1]: Finished modprobe@loop.service. Feb 9 09:57:36.657369 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 09:57:36.657379 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 09:57:36.657389 systemd[1]: Finished modprobe@configfs.service. Feb 9 09:57:36.657399 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 09:57:36.657408 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 09:57:36.657419 systemd[1]: Finished systemd-remount-fs.service. Feb 9 09:57:36.657429 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 09:57:36.657439 kernel: fuse: init (API version 7.34) Feb 9 09:57:36.657451 systemd-journald[1153]: Journal started Feb 9 09:57:36.657491 systemd-journald[1153]: Runtime Journal (/run/log/journal/b26ac01e4a454387861bc8ba5c872d0b) is 8.0M, max 78.6M, 70.6M free. Feb 9 09:57:16.023000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 09:57:17.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:57:17.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 09:57:17.308000 audit: BPF prog-id=10 op=LOAD Feb 9 09:57:17.308000 audit: BPF prog-id=10 op=UNLOAD Feb 9 09:57:17.327000 audit: BPF prog-id=11 op=LOAD Feb 9 09:57:17.327000 audit: BPF prog-id=11 op=UNLOAD Feb 9 09:57:22.614000 audit[1074]: AVC avc: denied { associate } for pid=1074 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 09:57:22.614000 audit[1074]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.614000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:57:22.625000 audit[1074]: AVC avc: denied { associate } for pid=1074 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 09:57:22.625000 audit[1074]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:22.625000 audit: CWD cwd="/" Feb 9 09:57:22.625000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:22.625000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:22.625000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 09:57:35.458000 audit: BPF prog-id=12 op=LOAD Feb 9 09:57:35.458000 audit: BPF prog-id=3 op=UNLOAD Feb 9 09:57:35.458000 audit: BPF prog-id=13 op=LOAD Feb 9 09:57:35.458000 audit: BPF prog-id=14 op=LOAD Feb 9 09:57:35.458000 audit: BPF prog-id=4 op=UNLOAD Feb 9 09:57:35.458000 audit: BPF prog-id=5 op=UNLOAD Feb 9 09:57:35.459000 audit: BPF prog-id=15 op=LOAD Feb 9 09:57:35.459000 audit: BPF prog-id=12 op=UNLOAD Feb 9 09:57:35.459000 audit: BPF prog-id=16 op=LOAD Feb 9 09:57:35.459000 audit: BPF prog-id=17 op=LOAD Feb 9 09:57:35.459000 audit: BPF prog-id=13 op=UNLOAD Feb 9 09:57:35.459000 audit: BPF prog-id=14 op=UNLOAD Feb 9 09:57:35.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:35.487000 audit: BPF prog-id=15 op=UNLOAD Feb 9 09:57:35.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:35.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:35.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.165000 audit: BPF prog-id=18 op=LOAD Feb 9 09:57:36.165000 audit: BPF prog-id=19 op=LOAD Feb 9 09:57:36.165000 audit: BPF prog-id=20 op=LOAD Feb 9 09:57:36.165000 audit: BPF prog-id=16 op=UNLOAD Feb 9 09:57:36.165000 audit: BPF prog-id=17 op=UNLOAD Feb 9 09:57:36.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.363000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.653000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 09:57:36.653000 audit[1153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc1b6e070 a2=4000 a3=1 items=0 ppid=1 pid=1153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:36.653000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 09:57:35.457283 systemd[1]: Queued start job for default target multi-user.target. Feb 9 09:57:22.456914 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:57:35.460644 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 09:57:22.464809 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:57:35.460986 systemd[1]: systemd-journald.service: Consumed 3.668s CPU time. Feb 9 09:57:22.464829 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:57:22.464868 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 09:57:22.464878 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 09:57:22.464911 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 09:57:22.464924 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 09:57:22.465151 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 09:57:22.465186 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 09:57:22.465198 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 09:57:22.466557 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 09:57:22.466590 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 09:57:22.466608 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 09:57:22.466622 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 09:57:22.466639 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 09:57:22.466652 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 09:57:32.907639 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:57:32.907900 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:57:32.908000 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:57:32.908174 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 09:57:32.908222 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 09:57:32.908280 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T09:57:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 09:57:36.823461 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 09:57:36.837147 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 09:57:36.847988 systemd[1]: Starting systemd-random-seed.service... Feb 9 09:57:36.859763 systemd[1]: Starting systemd-sysusers.service... Feb 9 09:57:36.871881 systemd[1]: Started systemd-journald.service. Feb 9 09:57:36.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.873138 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 09:57:36.873350 systemd[1]: Finished modprobe@fuse.service. Feb 9 09:57:36.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.879267 systemd[1]: Finished systemd-network-generator.service. Feb 9 09:57:36.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:36.885969 systemd[1]: Reached target network-pre.target. Feb 9 09:57:36.893307 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 09:57:36.900002 systemd[1]: Starting systemd-journal-flush.service... Feb 9 09:57:36.906409 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 09:57:37.098704 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 09:57:37.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:37.105790 systemd[1]: Starting systemd-udev-settle.service... Feb 9 09:57:37.115307 systemd[1]: Finished systemd-modules-load.service. Feb 9 09:57:37.120805 systemd-journald[1153]: Time spent on flushing to /var/log/journal/b26ac01e4a454387861bc8ba5c872d0b is 14.349ms for 1116 entries. Feb 9 09:57:37.120805 systemd-journald[1153]: System Journal (/var/log/journal/b26ac01e4a454387861bc8ba5c872d0b) is 8.0M, max 2.6G, 2.6G free. Feb 9 09:57:38.449342 systemd-journald[1153]: Received client request to flush runtime journal. Feb 9 09:57:37.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:37.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:37.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:37.131531 systemd[1]: Starting systemd-sysctl.service... Feb 9 09:57:38.450791 udevadm[1193]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 09:57:37.456766 systemd[1]: Finished systemd-random-seed.service. Feb 9 09:57:37.463377 systemd[1]: Reached target first-boot-complete.target. Feb 9 09:57:37.916160 systemd[1]: Finished systemd-sysctl.service. Feb 9 09:57:38.450875 systemd[1]: Finished systemd-journal-flush.service. Feb 9 09:57:38.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:39.667474 systemd[1]: Finished systemd-sysusers.service. Feb 9 09:57:39.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.369375 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 09:57:48.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.402475 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 9 09:57:48.402584 kernel: audit: type=1130 audit(1707472668.375:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.381000 audit: BPF prog-id=21 op=LOAD Feb 9 09:57:48.409362 kernel: audit: type=1334 audit(1707472668.381:141): prog-id=21 op=LOAD Feb 9 09:57:48.403215 systemd[1]: Starting systemd-udevd.service... Feb 9 09:57:48.402000 audit: BPF prog-id=22 op=LOAD Feb 9 09:57:48.416404 kernel: audit: type=1334 audit(1707472668.402:142): prog-id=22 op=LOAD Feb 9 09:57:48.402000 audit: BPF prog-id=7 op=UNLOAD Feb 9 09:57:48.427173 kernel: audit: type=1334 audit(1707472668.402:143): prog-id=7 op=UNLOAD Feb 9 09:57:48.402000 audit: BPF prog-id=8 op=UNLOAD Feb 9 09:57:48.435295 kernel: audit: type=1334 audit(1707472668.402:144): prog-id=8 op=UNLOAD Feb 9 09:57:48.511263 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 9 09:57:48.651294 systemd[1]: Started systemd-udevd.service. Feb 9 09:57:48.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.688355 systemd[1]: Starting systemd-networkd.service... Feb 9 09:57:48.699622 kernel: audit: type=1130 audit(1707472668.656:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.699718 kernel: audit: type=1334 audit(1707472668.687:146): prog-id=23 op=LOAD Feb 9 09:57:48.687000 audit: BPF prog-id=23 op=LOAD Feb 9 09:57:48.711000 audit: BPF prog-id=24 op=LOAD Feb 9 09:57:48.712393 systemd[1]: Starting systemd-userdbd.service... Feb 9 09:57:48.733329 kernel: audit: type=1334 audit(1707472668.711:147): prog-id=24 op=LOAD Feb 9 09:57:48.733423 kernel: audit: type=1334 audit(1707472668.711:148): prog-id=25 op=LOAD Feb 9 09:57:48.711000 audit: BPF prog-id=25 op=LOAD Feb 9 09:57:48.741881 kernel: audit: type=1334 audit(1707472668.711:149): prog-id=26 op=LOAD Feb 9 09:57:48.711000 audit: BPF prog-id=26 op=LOAD Feb 9 09:57:48.744436 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 09:57:48.783144 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 09:57:48.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.783906 systemd[1]: Started systemd-userdbd.service. Feb 9 09:57:48.820000 audit[1218]: AVC avc: denied { confidentiality } for pid=1218 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 09:57:48.836151 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 09:57:48.836262 kernel: hv_vmbus: registering driver hv_balloon Feb 9 09:57:48.842349 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 09:57:48.842414 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 09:57:48.850939 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 09:57:48.851031 kernel: hv_vmbus: registering driver hv_utils Feb 9 09:57:48.860869 kernel: Console: switching to colour dummy device 80x25 Feb 9 09:57:48.871549 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 09:57:48.871839 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 09:57:48.871890 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 09:57:48.871913 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 09:57:48.895772 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 09:57:48.895862 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 09:57:48.820000 audit[1218]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadf2f17b0 a1=aa2c a2=ffff94e624b0 a3=aaaadf047010 items=12 ppid=1198 pid=1218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:48.820000 audit: CWD cwd="/" Feb 9 09:57:48.820000 audit: PATH item=0 name=(null) inode=6715 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=1 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=2 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=3 name=(null) inode=10179 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=4 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=5 name=(null) inode=10180 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=6 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=7 name=(null) inode=10181 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=8 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=9 name=(null) inode=10182 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=10 name=(null) inode=10178 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PATH item=11 name=(null) inode=10183 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:57:48.820000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 09:57:48.947913 systemd-networkd[1219]: lo: Link UP Feb 9 09:57:48.947928 systemd-networkd[1219]: lo: Gained carrier Feb 9 09:57:48.948468 systemd-networkd[1219]: Enumeration completed Feb 9 09:57:48.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:48.948582 systemd[1]: Started systemd-networkd.service. Feb 9 09:57:48.958176 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:57:48.958257 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:57:49.009322 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1218) Feb 9 09:57:49.016101 kernel: mlx5_core fa06:00:02.0 enP64006s1: Link up Feb 9 09:57:49.033212 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 09:57:49.049052 systemd-networkd[1219]: enP64006s1: Link UP Feb 9 09:57:49.049244 kernel: hv_netvsc 002248c2-18bc-0022-48c2-18bc002248c2 eth0: Data path switched to VF: enP64006s1 Feb 9 09:57:49.049625 systemd-networkd[1219]: eth0: Link UP Feb 9 09:57:49.049927 systemd-networkd[1219]: eth0: Gained carrier Feb 9 09:57:49.055961 systemd-networkd[1219]: enP64006s1: Gained carrier Feb 9 09:57:49.061530 systemd[1]: Finished systemd-udev-settle.service. Feb 9 09:57:49.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.069934 systemd[1]: Starting lvm2-activation-early.service... Feb 9 09:57:49.077354 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:57:49.181722 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:57:49.213046 systemd[1]: Finished lvm2-activation-early.service. Feb 9 09:57:49.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.219096 systemd[1]: Reached target cryptsetup.target. Feb 9 09:57:49.226207 systemd[1]: Starting lvm2-activation.service... Feb 9 09:57:49.232008 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 09:57:49.262876 systemd[1]: Finished lvm2-activation.service. Feb 9 09:57:49.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.269212 systemd[1]: Reached target local-fs-pre.target. Feb 9 09:57:49.274958 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 09:57:49.274993 systemd[1]: Reached target local-fs.target. Feb 9 09:57:49.280565 systemd[1]: Reached target machines.target. Feb 9 09:57:49.287287 systemd[1]: Starting ldconfig.service... Feb 9 09:57:49.292140 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 09:57:49.292222 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:57:49.293519 systemd[1]: Starting systemd-boot-update.service... Feb 9 09:57:49.299893 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 09:57:49.308724 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 09:57:49.314728 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:57:49.314796 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 09:57:49.316230 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 09:57:49.324989 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1280 (bootctl) Feb 9 09:57:49.326347 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 09:57:49.383450 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 09:57:49.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.395534 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 09:57:49.396158 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 09:57:49.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.425919 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 09:57:49.452899 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 09:57:49.457868 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) Feb 9 09:57:49.457868 systemd-fsck[1288]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 09:57:49.459755 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 09:57:49.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.468939 systemd[1]: Mounting boot.mount... Feb 9 09:57:49.483611 systemd[1]: Mounted boot.mount. Feb 9 09:57:49.488423 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 09:57:49.495191 systemd[1]: Finished systemd-boot-update.service. Feb 9 09:57:49.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.716328 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 09:57:49.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.723865 systemd[1]: Starting audit-rules.service... Feb 9 09:57:49.729477 systemd[1]: Starting clean-ca-certificates.service... Feb 9 09:57:49.736132 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 09:57:49.742000 audit: BPF prog-id=27 op=LOAD Feb 9 09:57:49.744283 systemd[1]: Starting systemd-resolved.service... Feb 9 09:57:49.749000 audit: BPF prog-id=28 op=LOAD Feb 9 09:57:49.751474 systemd[1]: Starting systemd-timesyncd.service... Feb 9 09:57:49.758285 systemd[1]: Starting systemd-update-utmp.service... Feb 9 09:57:49.764200 systemd[1]: Finished clean-ca-certificates.service. Feb 9 09:57:49.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.770428 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 09:57:49.794000 audit[1305]: SYSTEM_BOOT pid=1305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.797886 systemd[1]: Finished systemd-update-utmp.service. Feb 9 09:57:49.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.819462 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 09:57:49.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.831425 systemd[1]: Started systemd-timesyncd.service. Feb 9 09:57:49.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:57:49.840645 systemd[1]: Reached target time-set.target. Feb 9 09:57:49.873832 systemd-resolved[1301]: Positive Trust Anchors: Feb 9 09:57:49.874185 systemd-resolved[1301]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 09:57:49.874264 systemd-resolved[1301]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 09:57:49.888000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 09:57:49.888000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdc9c5f60 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:57:49.888000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 09:57:49.892389 systemd-resolved[1301]: Using system hostname 'ci-3510.3.2-a-67daabce87'. Feb 9 09:57:49.893283 augenrules[1315]: No rules Feb 9 09:57:49.893965 systemd[1]: Finished audit-rules.service. Feb 9 09:57:49.899089 systemd[1]: Started systemd-resolved.service. Feb 9 09:57:49.904841 systemd[1]: Reached target network.target. Feb 9 09:57:49.909987 systemd[1]: Reached target nss-lookup.target. Feb 9 09:57:49.966643 systemd-timesyncd[1304]: Contacted time server 45.41.204.203:123 (0.flatcar.pool.ntp.org). Feb 9 09:57:49.966713 systemd-timesyncd[1304]: Initial clock synchronization to Fri 2024-02-09 09:57:49.947307 UTC. Feb 9 09:57:50.132239 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 09:57:50.134231 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:57:50.141161 systemd[1]: Reached target network-online.target. Feb 9 09:57:51.434314 ldconfig[1279]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 09:57:51.470452 systemd[1]: Finished ldconfig.service. Feb 9 09:57:51.476716 systemd[1]: Starting systemd-update-done.service... Feb 9 09:57:51.491179 systemd[1]: Finished systemd-update-done.service. Feb 9 09:57:51.497514 systemd[1]: Reached target sysinit.target. Feb 9 09:57:51.502827 systemd[1]: Started motdgen.path. Feb 9 09:57:51.507642 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 09:57:51.515115 systemd[1]: Started logrotate.timer. Feb 9 09:57:51.519873 systemd[1]: Started mdadm.timer. Feb 9 09:57:51.524307 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 09:57:51.530108 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 09:57:51.530142 systemd[1]: Reached target paths.target. Feb 9 09:57:51.535317 systemd[1]: Reached target timers.target. Feb 9 09:57:51.540886 systemd[1]: Listening on dbus.socket. Feb 9 09:57:51.546996 systemd[1]: Starting docker.socket... Feb 9 09:57:51.560161 systemd[1]: Listening on sshd.socket. Feb 9 09:57:51.564991 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:57:51.565511 systemd[1]: Listening on docker.socket. Feb 9 09:57:51.570677 systemd[1]: Reached target sockets.target. Feb 9 09:57:51.576167 systemd[1]: Reached target basic.target. Feb 9 09:57:51.581482 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:57:51.581515 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 09:57:51.582763 systemd[1]: Starting containerd.service... Feb 9 09:57:51.588603 systemd[1]: Starting dbus.service... Feb 9 09:57:51.594351 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 09:57:51.600666 systemd[1]: Starting extend-filesystems.service... Feb 9 09:57:51.605862 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 09:57:51.607079 systemd[1]: Starting motdgen.service... Feb 9 09:57:51.613252 systemd[1]: Started nvidia.service. Feb 9 09:57:51.619481 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 09:57:51.625982 systemd[1]: Starting prepare-critools.service... Feb 9 09:57:51.628518 jq[1325]: false Feb 9 09:57:51.632245 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 09:57:51.638592 systemd[1]: Starting sshd-keygen.service... Feb 9 09:57:51.645658 systemd[1]: Starting systemd-logind.service... Feb 9 09:57:51.652463 extend-filesystems[1326]: Found sda Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda1 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda2 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda3 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found usr Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda4 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda6 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda7 Feb 9 09:57:51.664713 extend-filesystems[1326]: Found sda9 Feb 9 09:57:51.664713 extend-filesystems[1326]: Checking size of /dev/sda9 Feb 9 09:57:51.654147 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 09:57:51.850977 extend-filesystems[1326]: Old size kept for /dev/sda9 Feb 9 09:57:51.850977 extend-filesystems[1326]: Found sr0 Feb 9 09:57:51.761729 dbus-daemon[1324]: [system] SELinux support is enabled Feb 9 09:57:51.654214 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 09:57:51.820719 dbus-daemon[1324]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 09:57:51.654704 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 09:57:51.905154 jq[1348]: true Feb 9 09:57:51.659298 systemd[1]: Starting update-engine.service... Feb 9 09:57:51.676665 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 09:57:51.905627 tar[1354]: ./ Feb 9 09:57:51.905627 tar[1354]: ./loopback Feb 9 09:57:51.696910 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 09:57:51.906043 tar[1355]: crictl Feb 9 09:57:51.697146 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 09:57:51.906404 jq[1356]: true Feb 9 09:57:51.697458 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 09:57:51.906619 env[1357]: time="2024-02-09T09:57:51.807475082Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 09:57:51.906619 env[1357]: time="2024-02-09T09:57:51.862581113Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 09:57:51.906619 env[1357]: time="2024-02-09T09:57:51.883541281Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.906619 env[1357]: time="2024-02-09T09:57:51.895999316Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.1 Feb 9 09:57:51.906619 env[1357]: 48-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:57:51.906619 env[1357]: time="2024-02-09T09:57:51.896037952Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.697599 systemd[1]: Finished motdgen.service. Feb 9 09:57:51.708437 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 09:57:51.708616 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 09:57:51.761923 systemd[1]: Started dbus.service. Feb 9 09:57:51.777581 systemd-logind[1338]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 09:57:51.783210 systemd-logind[1338]: New seat seat0. Feb 9 09:57:51.801906 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 09:57:51.802097 systemd[1]: Finished extend-filesystems.service. Feb 9 09:57:51.820185 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 09:57:51.820206 systemd[1]: Reached target system-config.target. Feb 9 09:57:51.841053 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 09:57:51.841102 systemd[1]: Reached target user-config.target. Feb 9 09:57:51.853599 systemd[1]: Started systemd-logind.service. Feb 9 09:57:51.921232 env[1357]: time="2024-02-09T09:57:51.921178567Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921232 env[1357]: time="2024-02-09T09:57:51.921219961Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921232 env[1357]: time="2024-02-09T09:57:51.921237261Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 09:57:51.921392 env[1357]: time="2024-02-09T09:57:51.921247849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921392 env[1357]: time="2024-02-09T09:57:51.921359443Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921618 env[1357]: time="2024-02-09T09:57:51.921589344Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921742 env[1357]: time="2024-02-09T09:57:51.921713964Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 09:57:51.921742 env[1357]: time="2024-02-09T09:57:51.921735419Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 09:57:51.921810 env[1357]: time="2024-02-09T09:57:51.921787960Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 09:57:51.921810 env[1357]: time="2024-02-09T09:57:51.921799427Z" level=info msg="metadata content store policy set" policy=shared Feb 9 09:57:51.922943 bash[1389]: Updated "/home/core/.ssh/authorized_keys" Feb 9 09:57:51.924138 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 09:57:51.936381 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 09:57:51.942789 env[1357]: time="2024-02-09T09:57:51.942740617Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 09:57:51.942789 env[1357]: time="2024-02-09T09:57:51.942792439Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 09:57:51.942939 env[1357]: time="2024-02-09T09:57:51.942808581Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 09:57:51.942939 env[1357]: time="2024-02-09T09:57:51.942848496Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.942939 env[1357]: time="2024-02-09T09:57:51.942864358Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.942939 env[1357]: time="2024-02-09T09:57:51.942882337Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.942939 env[1357]: time="2024-02-09T09:57:51.942897520Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943292 env[1357]: time="2024-02-09T09:57:51.943268342Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943328 env[1357]: time="2024-02-09T09:57:51.943294633Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943328 env[1357]: time="2024-02-09T09:57:51.943310854Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943328 env[1357]: time="2024-02-09T09:57:51.943324679Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943405 env[1357]: time="2024-02-09T09:57:51.943339662Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 09:57:51.943512 env[1357]: time="2024-02-09T09:57:51.943488134Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 09:57:51.943590 env[1357]: time="2024-02-09T09:57:51.943569722Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 09:57:51.943826 env[1357]: time="2024-02-09T09:57:51.943803699Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 09:57:51.943859 env[1357]: time="2024-02-09T09:57:51.943833905Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943859 env[1357]: time="2024-02-09T09:57:51.943849607Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 09:57:51.943908 env[1357]: time="2024-02-09T09:57:51.943898512Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943935 env[1357]: time="2024-02-09T09:57:51.943913415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943935 env[1357]: time="2024-02-09T09:57:51.943926480Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943977 env[1357]: time="2024-02-09T09:57:51.943939346Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943977 env[1357]: time="2024-02-09T09:57:51.943953610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.943977 env[1357]: time="2024-02-09T09:57:51.943966675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944033 env[1357]: time="2024-02-09T09:57:51.943978102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944033 env[1357]: time="2024-02-09T09:57:51.943990208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944033 env[1357]: time="2024-02-09T09:57:51.944004312Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 09:57:51.944182 env[1357]: time="2024-02-09T09:57:51.944145673Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944182 env[1357]: time="2024-02-09T09:57:51.944163093Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944182 env[1357]: time="2024-02-09T09:57:51.944175799Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.944246 env[1357]: time="2024-02-09T09:57:51.944187866Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 09:57:51.944246 env[1357]: time="2024-02-09T09:57:51.944203248Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 09:57:51.944246 env[1357]: time="2024-02-09T09:57:51.944214076Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 09:57:51.944246 env[1357]: time="2024-02-09T09:57:51.944233494Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 09:57:51.944318 env[1357]: time="2024-02-09T09:57:51.944271811Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.944465552Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.944528761Z" level=info msg="Connect containerd service" Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.944564721Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.945354550Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.945579856Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 09:57:51.946214 env[1357]: time="2024-02-09T09:57:51.945615056Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.947780695Z" level=info msg="containerd successfully booted in 0.141141s" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951476967Z" level=info msg="Start subscribing containerd event" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951547488Z" level=info msg="Start recovering state" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951636188Z" level=info msg="Start event monitor" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951657804Z" level=info msg="Start snapshots syncer" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951672787Z" level=info msg="Start cni network conf syncer for default" Feb 9 09:57:51.953846 env[1357]: time="2024-02-09T09:57:51.951681976Z" level=info msg="Start streaming server" Feb 9 09:57:51.947864 systemd[1]: Started containerd.service. Feb 9 09:57:51.955485 tar[1354]: ./bandwidth Feb 9 09:57:52.004482 update_engine[1346]: I0209 09:57:52.001147 1346 main.cc:92] Flatcar Update Engine starting Feb 9 09:57:52.008464 tar[1354]: ./ptp Feb 9 09:57:52.027577 systemd[1]: Started update-engine.service. Feb 9 09:57:52.034256 update_engine[1346]: I0209 09:57:52.027695 1346 update_check_scheduler.cc:74] Next update check in 4m37s Feb 9 09:57:52.036412 systemd[1]: Started locksmithd.service. Feb 9 09:57:52.063950 tar[1354]: ./vlan Feb 9 09:57:52.097460 tar[1354]: ./host-device Feb 9 09:57:52.130056 tar[1354]: ./tuning Feb 9 09:57:52.159636 tar[1354]: ./vrf Feb 9 09:57:52.189859 tar[1354]: ./sbr Feb 9 09:57:52.219778 tar[1354]: ./tap Feb 9 09:57:52.254322 tar[1354]: ./dhcp Feb 9 09:57:52.376343 tar[1354]: ./static Feb 9 09:57:52.422462 tar[1354]: ./firewall Feb 9 09:57:52.490440 tar[1354]: ./macvlan Feb 9 09:57:52.554111 tar[1354]: ./dummy Feb 9 09:57:52.572403 systemd[1]: Finished prepare-critools.service. Feb 9 09:57:52.592699 tar[1354]: ./bridge Feb 9 09:57:52.628695 tar[1354]: ./ipvlan Feb 9 09:57:52.662247 tar[1354]: ./portmap Feb 9 09:57:52.693733 tar[1354]: ./host-local Feb 9 09:57:52.738712 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 09:57:53.016300 locksmithd[1416]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 09:57:55.335359 sshd_keygen[1352]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 09:57:55.361322 systemd[1]: Finished sshd-keygen.service. Feb 9 09:57:55.372640 systemd[1]: Starting issuegen.service... Feb 9 09:57:55.379001 systemd[1]: Started waagent.service. Feb 9 09:57:55.384798 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 09:57:55.384984 systemd[1]: Finished issuegen.service. Feb 9 09:57:55.391658 systemd[1]: Starting systemd-user-sessions.service... Feb 9 09:57:55.406903 systemd[1]: Finished systemd-user-sessions.service. Feb 9 09:57:55.418331 systemd[1]: Started getty@tty1.service. Feb 9 09:57:55.425918 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 09:57:55.432576 systemd[1]: Reached target getty.target. Feb 9 09:57:55.438773 systemd[1]: Reached target multi-user.target. Feb 9 09:57:55.446625 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 09:57:55.456716 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 09:57:55.456911 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 09:57:55.466011 systemd[1]: Startup finished in 792ms (kernel) + 13.200s (initrd) + 40.587s (userspace) = 54.580s. Feb 9 09:57:55.692441 login[1437]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:57:55.693782 login[1438]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 09:57:55.720030 systemd[1]: Created slice user-500.slice. Feb 9 09:57:55.721246 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 09:57:55.723728 systemd-logind[1338]: New session 1 of user core. Feb 9 09:57:55.727580 systemd-logind[1338]: New session 2 of user core. Feb 9 09:57:55.737990 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 09:57:55.739494 systemd[1]: Starting user@500.service... Feb 9 09:57:55.749584 (systemd)[1441]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:57:55.882395 systemd[1441]: Queued start job for default target default.target. Feb 9 09:57:55.883280 systemd[1441]: Reached target paths.target. Feb 9 09:57:55.883303 systemd[1441]: Reached target sockets.target. Feb 9 09:57:55.883314 systemd[1441]: Reached target timers.target. Feb 9 09:57:55.883324 systemd[1441]: Reached target basic.target. Feb 9 09:57:55.883430 systemd[1]: Started user@500.service. Feb 9 09:57:55.884279 systemd[1]: Started session-1.scope. Feb 9 09:57:55.884796 systemd[1]: Started session-2.scope. Feb 9 09:57:55.886850 systemd[1441]: Reached target default.target. Feb 9 09:57:55.887635 systemd[1441]: Startup finished in 130ms. Feb 9 09:57:58.265764 waagent[1435]: 2024-02-09T09:57:58.265641Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 09:57:58.274446 waagent[1435]: 2024-02-09T09:57:58.274345Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 09:57:58.280444 waagent[1435]: 2024-02-09T09:57:58.280364Z INFO Daemon Daemon Python: 3.9.16 Feb 9 09:57:58.287278 waagent[1435]: 2024-02-09T09:57:58.287186Z INFO Daemon Daemon Run daemon Feb 9 09:57:58.292756 waagent[1435]: 2024-02-09T09:57:58.292680Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 09:57:58.312198 waagent[1435]: 2024-02-09T09:57:58.312027Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:57:58.331744 waagent[1435]: 2024-02-09T09:57:58.331603Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:57:58.344019 waagent[1435]: 2024-02-09T09:57:58.343927Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:57:58.350575 waagent[1435]: 2024-02-09T09:57:58.350486Z INFO Daemon Daemon Using waagent for provisioning Feb 9 09:57:58.357666 waagent[1435]: 2024-02-09T09:57:58.357589Z INFO Daemon Daemon Activate resource disk Feb 9 09:57:58.364095 waagent[1435]: 2024-02-09T09:57:58.363989Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 09:57:58.381129 waagent[1435]: 2024-02-09T09:57:58.381013Z INFO Daemon Daemon Found device: None Feb 9 09:57:58.386879 waagent[1435]: 2024-02-09T09:57:58.386787Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 09:57:58.398790 waagent[1435]: 2024-02-09T09:57:58.398694Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 09:57:58.414092 waagent[1435]: 2024-02-09T09:57:58.413999Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:57:58.422106 waagent[1435]: 2024-02-09T09:57:58.422004Z INFO Daemon Daemon Running default provisioning handler Feb 9 09:57:58.436732 waagent[1435]: 2024-02-09T09:57:58.436586Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 09:57:58.455233 waagent[1435]: 2024-02-09T09:57:58.455047Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 09:57:58.467346 waagent[1435]: 2024-02-09T09:57:58.467253Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 09:57:58.474333 waagent[1435]: 2024-02-09T09:57:58.474240Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 09:57:58.526686 waagent[1435]: 2024-02-09T09:57:58.526472Z INFO Daemon Daemon Successfully mounted dvd Feb 9 09:57:58.569424 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 09:57:58.582706 waagent[1435]: 2024-02-09T09:57:58.582553Z INFO Daemon Daemon Detect protocol endpoint Feb 9 09:57:58.589282 waagent[1435]: 2024-02-09T09:57:58.589185Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 09:57:58.596576 waagent[1435]: 2024-02-09T09:57:58.596486Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 09:57:58.604853 waagent[1435]: 2024-02-09T09:57:58.604765Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 09:57:58.611498 waagent[1435]: 2024-02-09T09:57:58.611419Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 09:57:58.619123 waagent[1435]: 2024-02-09T09:57:58.619021Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 09:57:58.659409 waagent[1435]: 2024-02-09T09:57:58.659333Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 09:57:58.669776 waagent[1435]: 2024-02-09T09:57:58.669725Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 09:57:58.676956 waagent[1435]: 2024-02-09T09:57:58.676878Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 09:57:59.219598 waagent[1435]: 2024-02-09T09:57:59.219436Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 09:57:59.236758 waagent[1435]: 2024-02-09T09:57:59.236678Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 09:57:59.243840 waagent[1435]: 2024-02-09T09:57:59.243770Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 09:57:59.321797 waagent[1435]: 2024-02-09T09:57:59.321645Z INFO Daemon Daemon Found private key matching thumbprint BDFD9307EBF38CD35FB5F01C7C7F1B2DA98BBE3E Feb 9 09:57:59.332600 waagent[1435]: 2024-02-09T09:57:59.332515Z INFO Daemon Daemon Certificate with thumbprint 1026BA6730E3894AC3E7CF02508CCBF27A58973C has no matching private key. Feb 9 09:57:59.344371 waagent[1435]: 2024-02-09T09:57:59.344288Z INFO Daemon Daemon Fetch goal state completed Feb 9 09:57:59.395816 waagent[1435]: 2024-02-09T09:57:59.395755Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: ab8b67e7-99f3-4d77-9638-719e07f4788a New eTag: 1263189054390552459] Feb 9 09:57:59.409373 waagent[1435]: 2024-02-09T09:57:59.409291Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:57:59.428150 waagent[1435]: 2024-02-09T09:57:59.428084Z INFO Daemon Daemon Starting provisioning Feb 9 09:57:59.434156 waagent[1435]: 2024-02-09T09:57:59.434081Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 09:57:59.439922 waagent[1435]: 2024-02-09T09:57:59.439853Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-67daabce87] Feb 9 09:57:59.464638 waagent[1435]: 2024-02-09T09:57:59.464498Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-67daabce87] Feb 9 09:57:59.473362 waagent[1435]: 2024-02-09T09:57:59.473244Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 09:57:59.481605 waagent[1435]: 2024-02-09T09:57:59.481531Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 09:57:59.499229 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 09:57:59.499403 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 09:57:59.499466 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 09:57:59.499706 systemd[1]: Stopping systemd-networkd.service... Feb 9 09:57:59.504119 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 09:57:59.505499 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 09:57:59.505675 systemd[1]: Stopped systemd-networkd.service. Feb 9 09:57:59.507794 systemd[1]: Starting systemd-networkd.service... Feb 9 09:57:59.535884 systemd-networkd[1484]: enP64006s1: Link UP Feb 9 09:57:59.535895 systemd-networkd[1484]: enP64006s1: Gained carrier Feb 9 09:57:59.536789 systemd-networkd[1484]: eth0: Link UP Feb 9 09:57:59.536801 systemd-networkd[1484]: eth0: Gained carrier Feb 9 09:57:59.537205 systemd-networkd[1484]: lo: Link UP Feb 9 09:57:59.537213 systemd-networkd[1484]: lo: Gained carrier Feb 9 09:57:59.537450 systemd-networkd[1484]: eth0: Gained IPv6LL Feb 9 09:57:59.537883 systemd-networkd[1484]: Enumeration completed Feb 9 09:57:59.538001 systemd[1]: Started systemd-networkd.service. Feb 9 09:57:59.546348 waagent[1435]: 2024-02-09T09:57:59.539424Z INFO Daemon Daemon Create user account if not exists Feb 9 09:57:59.539800 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 09:57:59.547573 waagent[1435]: 2024-02-09T09:57:59.547487Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 09:57:59.547721 systemd-networkd[1484]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 09:57:59.555483 waagent[1435]: 2024-02-09T09:57:59.555389Z INFO Daemon Daemon Configure sudoer Feb 9 09:57:59.563961 waagent[1435]: 2024-02-09T09:57:59.563871Z INFO Daemon Daemon Configure sshd Feb 9 09:57:59.569831 waagent[1435]: 2024-02-09T09:57:59.569744Z INFO Daemon Daemon Deploy ssh public key. Feb 9 09:57:59.579172 systemd-networkd[1484]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 09:57:59.582385 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 09:58:00.796052 waagent[1435]: 2024-02-09T09:58:00.795984Z INFO Daemon Daemon Provisioning complete Feb 9 09:58:00.818764 waagent[1435]: 2024-02-09T09:58:00.818693Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 09:58:00.828047 waagent[1435]: 2024-02-09T09:58:00.827951Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 09:58:00.841571 waagent[1435]: 2024-02-09T09:58:00.841481Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 09:58:01.148384 waagent[1493]: 2024-02-09T09:58:01.148278Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 09:58:01.149182 waagent[1493]: 2024-02-09T09:58:01.149119Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:01.149326 waagent[1493]: 2024-02-09T09:58:01.149277Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:01.164643 waagent[1493]: 2024-02-09T09:58:01.164544Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 09:58:01.164842 waagent[1493]: 2024-02-09T09:58:01.164790Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 09:58:01.238588 waagent[1493]: 2024-02-09T09:58:01.238442Z INFO ExtHandler ExtHandler Found private key matching thumbprint BDFD9307EBF38CD35FB5F01C7C7F1B2DA98BBE3E Feb 9 09:58:01.238815 waagent[1493]: 2024-02-09T09:58:01.238760Z INFO ExtHandler ExtHandler Certificate with thumbprint 1026BA6730E3894AC3E7CF02508CCBF27A58973C has no matching private key. Feb 9 09:58:01.239053 waagent[1493]: 2024-02-09T09:58:01.239005Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 09:58:01.256368 waagent[1493]: 2024-02-09T09:58:01.256306Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 8abb2d54-970d-4174-8587-be7966e9d455 New eTag: 1263189054390552459] Feb 9 09:58:01.257019 waagent[1493]: 2024-02-09T09:58:01.256957Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 09:58:01.305017 waagent[1493]: 2024-02-09T09:58:01.304861Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:58:01.319241 waagent[1493]: 2024-02-09T09:58:01.319149Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1493 Feb 9 09:58:01.323143 waagent[1493]: 2024-02-09T09:58:01.323046Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:58:01.324513 waagent[1493]: 2024-02-09T09:58:01.324453Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:58:01.355042 waagent[1493]: 2024-02-09T09:58:01.354967Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:58:01.355541 waagent[1493]: 2024-02-09T09:58:01.355476Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:58:01.363565 waagent[1493]: 2024-02-09T09:58:01.363492Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:58:01.364190 waagent[1493]: 2024-02-09T09:58:01.364128Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:58:01.365445 waagent[1493]: 2024-02-09T09:58:01.365368Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 09:58:01.367026 waagent[1493]: 2024-02-09T09:58:01.366951Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:58:01.367765 waagent[1493]: 2024-02-09T09:58:01.367703Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:01.368041 waagent[1493]: 2024-02-09T09:58:01.367989Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:01.368793 waagent[1493]: 2024-02-09T09:58:01.368733Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:58:01.369546 waagent[1493]: 2024-02-09T09:58:01.369471Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:58:01.369745 waagent[1493]: 2024-02-09T09:58:01.369670Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:58:01.369745 waagent[1493]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:58:01.369745 waagent[1493]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:58:01.369745 waagent[1493]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:58:01.369745 waagent[1493]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:01.369745 waagent[1493]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:01.369745 waagent[1493]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:01.370405 waagent[1493]: 2024-02-09T09:58:01.370202Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:58:01.370835 waagent[1493]: 2024-02-09T09:58:01.370767Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:58:01.372988 waagent[1493]: 2024-02-09T09:58:01.372836Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:01.373450 waagent[1493]: 2024-02-09T09:58:01.373372Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:58:01.373889 waagent[1493]: 2024-02-09T09:58:01.373815Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:01.374461 waagent[1493]: 2024-02-09T09:58:01.374388Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:58:01.374745 waagent[1493]: 2024-02-09T09:58:01.374662Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:58:01.376241 waagent[1493]: 2024-02-09T09:58:01.376149Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:58:01.376677 waagent[1493]: 2024-02-09T09:58:01.376616Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:58:01.377868 waagent[1493]: 2024-02-09T09:58:01.377764Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:58:01.396706 waagent[1493]: 2024-02-09T09:58:01.396630Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 09:58:01.398570 waagent[1493]: 2024-02-09T09:58:01.398458Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1484' Feb 9 09:58:01.400112 waagent[1493]: 2024-02-09T09:58:01.398056Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:58:01.401618 waagent[1493]: 2024-02-09T09:58:01.401547Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 09:58:01.442403 waagent[1493]: 2024-02-09T09:58:01.442272Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:58:01.442403 waagent[1493]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:58:01.442403 waagent[1493]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:58:01.442403 waagent[1493]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c2:18:bc brd ff:ff:ff:ff:ff:ff Feb 9 09:58:01.442403 waagent[1493]: 3: enP64006s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c2:18:bc brd ff:ff:ff:ff:ff:ff\ altname enP64006p0s2 Feb 9 09:58:01.442403 waagent[1493]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:58:01.442403 waagent[1493]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:58:01.442403 waagent[1493]: 2: eth0 inet 10.200.20.44/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:58:01.442403 waagent[1493]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:58:01.442403 waagent[1493]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:58:01.442403 waagent[1493]: 2: eth0 inet6 fe80::222:48ff:fec2:18bc/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:58:01.456553 waagent[1493]: 2024-02-09T09:58:01.456491Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 09:58:01.546381 waagent[1493]: 2024-02-09T09:58:01.546303Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 9 09:58:01.549908 waagent[1493]: 2024-02-09T09:58:01.549780Z INFO EnvHandler ExtHandler Firewall rules: Feb 9 09:58:01.549908 waagent[1493]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:01.549908 waagent[1493]: pkts bytes target prot opt in out source destination Feb 9 09:58:01.549908 waagent[1493]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:01.549908 waagent[1493]: pkts bytes target prot opt in out source destination Feb 9 09:58:01.549908 waagent[1493]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:01.549908 waagent[1493]: pkts bytes target prot opt in out source destination Feb 9 09:58:01.549908 waagent[1493]: 3 856 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:58:01.549908 waagent[1493]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:58:01.551876 waagent[1493]: 2024-02-09T09:58:01.551819Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 09:58:01.623770 waagent[1493]: 2024-02-09T09:58:01.623700Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 09:58:01.845352 waagent[1435]: 2024-02-09T09:58:01.845176Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 09:58:01.849440 waagent[1435]: 2024-02-09T09:58:01.849380Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 09:58:03.014530 waagent[1531]: 2024-02-09T09:58:03.014410Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 09:58:03.015312 waagent[1531]: 2024-02-09T09:58:03.015246Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 09:58:03.015451 waagent[1531]: 2024-02-09T09:58:03.015403Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 09:58:03.023575 waagent[1531]: 2024-02-09T09:58:03.023427Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 09:58:03.024017 waagent[1531]: 2024-02-09T09:58:03.023958Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:03.024211 waagent[1531]: 2024-02-09T09:58:03.024158Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:03.037567 waagent[1531]: 2024-02-09T09:58:03.037475Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 09:58:03.051691 waagent[1531]: 2024-02-09T09:58:03.051626Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 09:58:03.052831 waagent[1531]: 2024-02-09T09:58:03.052768Z INFO ExtHandler Feb 9 09:58:03.052984 waagent[1531]: 2024-02-09T09:58:03.052935Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 9a332a32-5fa9-4436-b174-aec47ca01ac0 eTag: 1263189054390552459 source: Fabric] Feb 9 09:58:03.053763 waagent[1531]: 2024-02-09T09:58:03.053704Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 09:58:03.054994 waagent[1531]: 2024-02-09T09:58:03.054932Z INFO ExtHandler Feb 9 09:58:03.055153 waagent[1531]: 2024-02-09T09:58:03.055105Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 09:58:03.061980 waagent[1531]: 2024-02-09T09:58:03.061920Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 09:58:03.062560 waagent[1531]: 2024-02-09T09:58:03.062508Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 09:58:03.086184 waagent[1531]: 2024-02-09T09:58:03.086119Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 09:58:03.161132 waagent[1531]: 2024-02-09T09:58:03.160954Z INFO ExtHandler Downloaded certificate {'thumbprint': 'BDFD9307EBF38CD35FB5F01C7C7F1B2DA98BBE3E', 'hasPrivateKey': True} Feb 9 09:58:03.162298 waagent[1531]: 2024-02-09T09:58:03.162233Z INFO ExtHandler Downloaded certificate {'thumbprint': '1026BA6730E3894AC3E7CF02508CCBF27A58973C', 'hasPrivateKey': False} Feb 9 09:58:03.163386 waagent[1531]: 2024-02-09T09:58:03.163319Z INFO ExtHandler Fetch goal state completed Feb 9 09:58:03.446191 waagent[1531]: 2024-02-09T09:58:03.446103Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1531 Feb 9 09:58:03.449776 waagent[1531]: 2024-02-09T09:58:03.449694Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 09:58:03.451308 waagent[1531]: 2024-02-09T09:58:03.451240Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 09:58:03.456657 waagent[1531]: 2024-02-09T09:58:03.456583Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 09:58:03.457158 waagent[1531]: 2024-02-09T09:58:03.457094Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 09:58:03.465324 waagent[1531]: 2024-02-09T09:58:03.465254Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 09:58:03.465899 waagent[1531]: 2024-02-09T09:58:03.465837Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 09:58:03.485821 waagent[1531]: 2024-02-09T09:58:03.485670Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 9 09:58:03.488801 waagent[1531]: 2024-02-09T09:58:03.488652Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 9 09:58:03.492651 waagent[1531]: 2024-02-09T09:58:03.492586Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 09:58:03.494385 waagent[1531]: 2024-02-09T09:58:03.494308Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 09:58:03.495115 waagent[1531]: 2024-02-09T09:58:03.495030Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:03.495400 waagent[1531]: 2024-02-09T09:58:03.495350Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:03.496092 waagent[1531]: 2024-02-09T09:58:03.496008Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 09:58:03.496490 waagent[1531]: 2024-02-09T09:58:03.496434Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 09:58:03.496490 waagent[1531]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 09:58:03.496490 waagent[1531]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 09:58:03.496490 waagent[1531]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 09:58:03.496490 waagent[1531]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:03.496490 waagent[1531]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:03.496490 waagent[1531]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 09:58:03.499037 waagent[1531]: 2024-02-09T09:58:03.498902Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 09:58:03.500096 waagent[1531]: 2024-02-09T09:58:03.500017Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 09:58:03.500723 waagent[1531]: 2024-02-09T09:58:03.500659Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 09:58:03.503206 waagent[1531]: 2024-02-09T09:58:03.503039Z INFO EnvHandler ExtHandler Configure routes Feb 9 09:58:03.503553 waagent[1531]: 2024-02-09T09:58:03.503474Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 09:58:03.503711 waagent[1531]: 2024-02-09T09:58:03.503626Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 09:58:03.504126 waagent[1531]: 2024-02-09T09:58:03.504011Z INFO EnvHandler ExtHandler Gateway:None Feb 9 09:58:03.504973 waagent[1531]: 2024-02-09T09:58:03.504903Z INFO EnvHandler ExtHandler Routes:None Feb 9 09:58:03.508595 waagent[1531]: 2024-02-09T09:58:03.508479Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 09:58:03.510647 waagent[1531]: 2024-02-09T09:58:03.510452Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 09:58:03.512325 waagent[1531]: 2024-02-09T09:58:03.512252Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 09:58:03.513103 waagent[1531]: 2024-02-09T09:58:03.512984Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 09:58:03.513103 waagent[1531]: Executing ['ip', '-a', '-o', 'link']: Feb 9 09:58:03.513103 waagent[1531]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 09:58:03.513103 waagent[1531]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c2:18:bc brd ff:ff:ff:ff:ff:ff Feb 9 09:58:03.513103 waagent[1531]: 3: enP64006s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c2:18:bc brd ff:ff:ff:ff:ff:ff\ altname enP64006p0s2 Feb 9 09:58:03.513103 waagent[1531]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 09:58:03.513103 waagent[1531]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 09:58:03.513103 waagent[1531]: 2: eth0 inet 10.200.20.44/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 09:58:03.513103 waagent[1531]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 09:58:03.513103 waagent[1531]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 09:58:03.513103 waagent[1531]: 2: eth0 inet6 fe80::222:48ff:fec2:18bc/64 scope link \ valid_lft forever preferred_lft forever Feb 9 09:58:03.529518 waagent[1531]: 2024-02-09T09:58:03.529236Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 09:58:03.532499 waagent[1531]: 2024-02-09T09:58:03.532277Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 09:58:03.588966 waagent[1531]: 2024-02-09T09:58:03.588893Z INFO ExtHandler ExtHandler Feb 9 09:58:03.589373 waagent[1531]: 2024-02-09T09:58:03.589306Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 09:58:03.589373 waagent[1531]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:03.589373 waagent[1531]: pkts bytes target prot opt in out source destination Feb 9 09:58:03.589373 waagent[1531]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:03.589373 waagent[1531]: pkts bytes target prot opt in out source destination Feb 9 09:58:03.589373 waagent[1531]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 09:58:03.589373 waagent[1531]: pkts bytes target prot opt in out source destination Feb 9 09:58:03.589373 waagent[1531]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 09:58:03.589373 waagent[1531]: 105 13135 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 09:58:03.589373 waagent[1531]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 09:58:03.589601 waagent[1531]: 2024-02-09T09:58:03.589484Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 8000db3f-a67b-441a-83dd-1be35b967861 correlation 815bc878-09cb-4a0e-a4b6-e62aa68bf318 created: 2024-02-09T09:56:38.589821Z] Feb 9 09:58:03.593171 waagent[1531]: 2024-02-09T09:58:03.593090Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 09:58:03.596946 waagent[1531]: 2024-02-09T09:58:03.596864Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 7 ms] Feb 9 09:58:03.619283 waagent[1531]: 2024-02-09T09:58:03.619207Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 09:58:03.631506 waagent[1531]: 2024-02-09T09:58:03.631419Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: D7B6B7D5-354F-4BBE-A528-9C948944D87B;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 09:58:36.899159 update_engine[1346]: I0209 09:58:36.899111 1346 update_attempter.cc:509] Updating boot flags... Feb 9 09:58:37.033417 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 09:58:45.335718 systemd[1]: Created slice system-sshd.slice. Feb 9 09:58:45.336931 systemd[1]: Started sshd@0-10.200.20.44:22-10.200.12.6:39254.service. Feb 9 09:58:45.814477 sshd[1611]: Accepted publickey for core from 10.200.12.6 port 39254 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:45.820561 sshd[1611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:45.825226 systemd[1]: Started session-3.scope. Feb 9 09:58:45.825521 systemd-logind[1338]: New session 3 of user core. Feb 9 09:58:46.191306 systemd[1]: Started sshd@1-10.200.20.44:22-10.200.12.6:39256.service. Feb 9 09:58:46.644771 sshd[1616]: Accepted publickey for core from 10.200.12.6 port 39256 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:46.646107 sshd[1616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:46.649985 systemd-logind[1338]: New session 4 of user core. Feb 9 09:58:46.650465 systemd[1]: Started session-4.scope. Feb 9 09:58:46.973194 sshd[1616]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:46.975748 systemd[1]: sshd@1-10.200.20.44:22-10.200.12.6:39256.service: Deactivated successfully. Feb 9 09:58:46.976468 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 09:58:46.976986 systemd-logind[1338]: Session 4 logged out. Waiting for processes to exit. Feb 9 09:58:46.977680 systemd-logind[1338]: Removed session 4. Feb 9 09:58:47.044246 systemd[1]: Started sshd@2-10.200.20.44:22-10.200.12.6:58992.service. Feb 9 09:58:47.467860 sshd[1622]: Accepted publickey for core from 10.200.12.6 port 58992 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:47.469112 sshd[1622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:47.472901 systemd-logind[1338]: New session 5 of user core. Feb 9 09:58:47.473374 systemd[1]: Started session-5.scope. Feb 9 09:58:47.772847 sshd[1622]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:47.775251 systemd[1]: sshd@2-10.200.20.44:22-10.200.12.6:58992.service: Deactivated successfully. Feb 9 09:58:47.775933 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 09:58:47.776491 systemd-logind[1338]: Session 5 logged out. Waiting for processes to exit. Feb 9 09:58:47.777341 systemd-logind[1338]: Removed session 5. Feb 9 09:58:47.848640 systemd[1]: Started sshd@3-10.200.20.44:22-10.200.12.6:59004.service. Feb 9 09:58:48.267129 sshd[1628]: Accepted publickey for core from 10.200.12.6 port 59004 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:48.268669 sshd[1628]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:48.272798 systemd[1]: Started session-6.scope. Feb 9 09:58:48.274032 systemd-logind[1338]: New session 6 of user core. Feb 9 09:58:48.573644 sshd[1628]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:48.576367 systemd[1]: sshd@3-10.200.20.44:22-10.200.12.6:59004.service: Deactivated successfully. Feb 9 09:58:48.577010 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 09:58:48.577529 systemd-logind[1338]: Session 6 logged out. Waiting for processes to exit. Feb 9 09:58:48.578286 systemd-logind[1338]: Removed session 6. Feb 9 09:58:48.645083 systemd[1]: Started sshd@4-10.200.20.44:22-10.200.12.6:59010.service. Feb 9 09:58:49.066822 sshd[1634]: Accepted publickey for core from 10.200.12.6 port 59010 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:49.068442 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:49.072609 systemd[1]: Started session-7.scope. Feb 9 09:58:49.073961 systemd-logind[1338]: New session 7 of user core. Feb 9 09:58:49.369721 sudo[1640]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 09:58:49.369928 sudo[1640]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:58:49.425263 dbus-daemon[1324]: avc: received setenforce notice (enforcing=1) Feb 9 09:58:49.427085 sudo[1640]: pam_unix(sudo:session): session closed for user root Feb 9 09:58:49.519774 sshd[1634]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:49.522491 systemd[1]: sshd@4-10.200.20.44:22-10.200.12.6:59010.service: Deactivated successfully. Feb 9 09:58:49.523303 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 09:58:49.523835 systemd-logind[1338]: Session 7 logged out. Waiting for processes to exit. Feb 9 09:58:49.524610 systemd-logind[1338]: Removed session 7. Feb 9 09:58:49.598060 systemd[1]: Started sshd@5-10.200.20.44:22-10.200.12.6:59020.service. Feb 9 09:58:50.026274 sshd[1644]: Accepted publickey for core from 10.200.12.6 port 59020 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:50.027601 sshd[1644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:50.031715 systemd-logind[1338]: New session 8 of user core. Feb 9 09:58:50.032406 systemd[1]: Started session-8.scope. Feb 9 09:58:50.270130 sudo[1648]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 09:58:50.270333 sudo[1648]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:58:50.272812 sudo[1648]: pam_unix(sudo:session): session closed for user root Feb 9 09:58:50.277190 sudo[1647]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 09:58:50.277676 sudo[1647]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:58:50.286298 systemd[1]: Stopping audit-rules.service... Feb 9 09:58:50.286000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:58:50.292427 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 9 09:58:50.292482 kernel: audit: type=1305 audit(1707472730.286:169): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 09:58:50.286000 audit[1651]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe691a1e0 a2=420 a3=0 items=0 ppid=1 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:50.305897 auditctl[1651]: No rules Feb 9 09:58:50.306389 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 09:58:50.306568 systemd[1]: Stopped audit-rules.service. Feb 9 09:58:50.308288 systemd[1]: Starting audit-rules.service... Feb 9 09:58:50.345970 kernel: audit: type=1300 audit(1707472730.286:169): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe691a1e0 a2=420 a3=0 items=0 ppid=1 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:50.346038 kernel: audit: type=1327 audit(1707472730.286:169): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:58:50.346059 kernel: audit: type=1131 audit(1707472730.305:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.286000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 09:58:50.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.367188 augenrules[1668]: No rules Feb 9 09:58:50.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.368248 systemd[1]: Finished audit-rules.service. Feb 9 09:58:50.388660 sudo[1647]: pam_unix(sudo:session): session closed for user root Feb 9 09:58:50.387000 audit[1647]: USER_END pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.412851 kernel: audit: type=1130 audit(1707472730.367:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.412932 kernel: audit: type=1106 audit(1707472730.387:172): pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.387000 audit[1647]: CRED_DISP pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.433673 kernel: audit: type=1104 audit(1707472730.387:173): pid=1647 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.479701 sshd[1644]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:50.479000 audit[1644]: USER_END pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.509762 systemd[1]: sshd@5-10.200.20.44:22-10.200.12.6:59020.service: Deactivated successfully. Feb 9 09:58:50.479000 audit[1644]: CRED_DISP pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.510151 kernel: audit: type=1106 audit(1707472730.479:174): pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.510509 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 09:58:50.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.44:22-10.200.12.6:59020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.554649 kernel: audit: type=1104 audit(1707472730.479:175): pid=1644 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.554735 kernel: audit: type=1131 audit(1707472730.508:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.44:22-10.200.12.6:59020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.554916 systemd-logind[1338]: Session 8 logged out. Waiting for processes to exit. Feb 9 09:58:50.558669 systemd[1]: Started sshd@6-10.200.20.44:22-10.200.12.6:59028.service. Feb 9 09:58:50.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.44:22-10.200.12.6:59028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:50.559756 systemd-logind[1338]: Removed session 8. Feb 9 09:58:50.975000 audit[1674]: USER_ACCT pid=1674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.976888 sshd[1674]: Accepted publickey for core from 10.200.12.6 port 59028 ssh2: RSA SHA256:hRMUPydBxGv30tVhZeI0xMvD4t7pzUsgMKn9+EnuIn0 Feb 9 09:58:50.977000 audit[1674]: CRED_ACQ pid=1674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.977000 audit[1674]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe7447e20 a2=3 a3=1 items=0 ppid=1 pid=1674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:50.977000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 09:58:50.978451 sshd[1674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 09:58:50.982521 systemd[1]: Started session-9.scope. Feb 9 09:58:50.983794 systemd-logind[1338]: New session 9 of user core. Feb 9 09:58:50.986000 audit[1674]: USER_START pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:50.987000 audit[1676]: CRED_ACQ pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:51.215000 audit[1677]: USER_ACCT pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:51.215000 audit[1677]: CRED_REFR pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:51.216710 sudo[1677]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 09:58:51.216914 sudo[1677]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 09:58:51.217000 audit[1677]: USER_START pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:51.805667 systemd[1]: Reloading. Feb 9 09:58:51.892784 /usr/lib/systemd/system-generators/torcx-generator[1707]: time="2024-02-09T09:58:51Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:58:51.892814 /usr/lib/systemd/system-generators/torcx-generator[1707]: time="2024-02-09T09:58:51Z" level=info msg="torcx already run" Feb 9 09:58:51.951133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:58:51.951308 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:58:51.966736 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:58:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit: BPF prog-id=35 op=LOAD Feb 9 09:58:52.034000 audit: BPF prog-id=24 op=UNLOAD Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit: BPF prog-id=36 op=LOAD Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit: BPF prog-id=37 op=LOAD Feb 9 09:58:52.035000 audit: BPF prog-id=25 op=UNLOAD Feb 9 09:58:52.035000 audit: BPF prog-id=26 op=UNLOAD Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.036000 audit: BPF prog-id=38 op=LOAD Feb 9 09:58:52.036000 audit: BPF prog-id=34 op=UNLOAD Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit: BPF prog-id=39 op=LOAD Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.038000 audit: BPF prog-id=40 op=LOAD Feb 9 09:58:52.038000 audit: BPF prog-id=21 op=UNLOAD Feb 9 09:58:52.039000 audit: BPF prog-id=22 op=UNLOAD Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.040000 audit: BPF prog-id=41 op=LOAD Feb 9 09:58:52.040000 audit: BPF prog-id=28 op=UNLOAD Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit: BPF prog-id=42 op=LOAD Feb 9 09:58:52.042000 audit: BPF prog-id=29 op=UNLOAD Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.042000 audit: BPF prog-id=43 op=LOAD Feb 9 09:58:52.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit: BPF prog-id=44 op=LOAD Feb 9 09:58:52.043000 audit: BPF prog-id=30 op=UNLOAD Feb 9 09:58:52.043000 audit: BPF prog-id=31 op=UNLOAD Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.044000 audit: BPF prog-id=45 op=LOAD Feb 9 09:58:52.044000 audit: BPF prog-id=27 op=UNLOAD Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.045000 audit: BPF prog-id=46 op=LOAD Feb 9 09:58:52.045000 audit: BPF prog-id=18 op=UNLOAD Feb 9 09:58:52.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit: BPF prog-id=47 op=LOAD Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.046000 audit: BPF prog-id=48 op=LOAD Feb 9 09:58:52.046000 audit: BPF prog-id=19 op=UNLOAD Feb 9 09:58:52.046000 audit: BPF prog-id=20 op=UNLOAD Feb 9 09:58:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:52.049000 audit: BPF prog-id=49 op=LOAD Feb 9 09:58:52.049000 audit: BPF prog-id=32 op=UNLOAD Feb 9 09:58:52.071955 systemd[1]: Started kubelet.service. Feb 9 09:58:52.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:52.089232 systemd[1]: Starting coreos-metadata.service... Feb 9 09:58:52.126157 coreos-metadata[1773]: Feb 09 09:58:52.126 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 09:58:52.130869 kubelet[1765]: E0209 09:58:52.130814 1765 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 09:58:52.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 09:58:52.133350 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 09:58:52.133474 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 09:58:52.136239 coreos-metadata[1773]: Feb 09 09:58:52.136 INFO Fetch successful Feb 9 09:58:52.136560 coreos-metadata[1773]: Feb 09 09:58:52.136 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 09:58:52.138335 coreos-metadata[1773]: Feb 09 09:58:52.138 INFO Fetch successful Feb 9 09:58:52.138770 coreos-metadata[1773]: Feb 09 09:58:52.138 INFO Fetching http://168.63.129.16/machine/042031ae-fa6f-4439-aecd-7ef4c14bb6be/f74bf46b%2D7179%2D415f%2Db99b%2D062985b75001.%5Fci%2D3510.3.2%2Da%2D67daabce87?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 09:58:52.140593 coreos-metadata[1773]: Feb 09 09:58:52.140 INFO Fetch successful Feb 9 09:58:52.174104 coreos-metadata[1773]: Feb 09 09:58:52.174 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 09:58:52.187748 coreos-metadata[1773]: Feb 09 09:58:52.187 INFO Fetch successful Feb 9 09:58:52.196602 systemd[1]: Finished coreos-metadata.service. Feb 9 09:58:52.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:53.832768 systemd[1]: Stopped kubelet.service. Feb 9 09:58:53.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:53.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:53.849148 systemd[1]: Reloading. Feb 9 09:58:53.914080 /usr/lib/systemd/system-generators/torcx-generator[1830]: time="2024-02-09T09:58:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 09:58:53.914393 /usr/lib/systemd/system-generators/torcx-generator[1830]: time="2024-02-09T09:58:53Z" level=info msg="torcx already run" Feb 9 09:58:53.992032 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 09:58:53.992223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 09:58:54.007602 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 09:58:54.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit: BPF prog-id=50 op=LOAD Feb 9 09:58:54.075000 audit: BPF prog-id=35 op=UNLOAD Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit: BPF prog-id=51 op=LOAD Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.076000 audit: BPF prog-id=52 op=LOAD Feb 9 09:58:54.076000 audit: BPF prog-id=36 op=UNLOAD Feb 9 09:58:54.076000 audit: BPF prog-id=37 op=UNLOAD Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.077000 audit: BPF prog-id=53 op=LOAD Feb 9 09:58:54.077000 audit: BPF prog-id=38 op=UNLOAD Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit: BPF prog-id=54 op=LOAD Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.080000 audit: BPF prog-id=55 op=LOAD Feb 9 09:58:54.080000 audit: BPF prog-id=39 op=UNLOAD Feb 9 09:58:54.080000 audit: BPF prog-id=40 op=UNLOAD Feb 9 09:58:54.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.081000 audit: BPF prog-id=56 op=LOAD Feb 9 09:58:54.081000 audit: BPF prog-id=41 op=UNLOAD Feb 9 09:58:54.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit: BPF prog-id=57 op=LOAD Feb 9 09:58:54.083000 audit: BPF prog-id=42 op=UNLOAD Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit: BPF prog-id=58 op=LOAD Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.083000 audit: BPF prog-id=59 op=LOAD Feb 9 09:58:54.083000 audit: BPF prog-id=43 op=UNLOAD Feb 9 09:58:54.083000 audit: BPF prog-id=44 op=UNLOAD Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.085000 audit: BPF prog-id=60 op=LOAD Feb 9 09:58:54.085000 audit: BPF prog-id=45 op=UNLOAD Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit: BPF prog-id=61 op=LOAD Feb 9 09:58:54.086000 audit: BPF prog-id=46 op=UNLOAD Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit: BPF prog-id=62 op=LOAD Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.086000 audit: BPF prog-id=63 op=LOAD Feb 9 09:58:54.086000 audit: BPF prog-id=47 op=UNLOAD Feb 9 09:58:54.086000 audit: BPF prog-id=48 op=UNLOAD Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:54.088000 audit: BPF prog-id=64 op=LOAD Feb 9 09:58:54.088000 audit: BPF prog-id=49 op=UNLOAD Feb 9 09:58:54.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:54.111997 systemd[1]: Started kubelet.service. Feb 9 09:58:54.163713 kubelet[1889]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:54.163713 kubelet[1889]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 09:58:54.163713 kubelet[1889]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 09:58:54.164083 kubelet[1889]: I0209 09:58:54.163789 1889 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 09:58:55.306021 kubelet[1889]: I0209 09:58:55.305991 1889 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 09:58:55.306370 kubelet[1889]: I0209 09:58:55.306356 1889 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 09:58:55.306650 kubelet[1889]: I0209 09:58:55.306635 1889 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 09:58:55.308917 kubelet[1889]: I0209 09:58:55.308875 1889 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 09:58:55.313664 kubelet[1889]: W0209 09:58:55.313643 1889 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 09:58:55.315007 kubelet[1889]: I0209 09:58:55.314981 1889 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 09:58:55.315345 kubelet[1889]: I0209 09:58:55.315331 1889 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 09:58:55.315660 kubelet[1889]: I0209 09:58:55.315642 1889 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 09:58:55.315793 kubelet[1889]: I0209 09:58:55.315780 1889 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 09:58:55.315874 kubelet[1889]: I0209 09:58:55.315863 1889 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 09:58:55.316031 kubelet[1889]: I0209 09:58:55.316019 1889 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:55.316224 kubelet[1889]: I0209 09:58:55.316211 1889 kubelet.go:393] "Attempting to sync node with API server" Feb 9 09:58:55.316295 kubelet[1889]: I0209 09:58:55.316286 1889 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 09:58:55.316375 kubelet[1889]: I0209 09:58:55.316361 1889 kubelet.go:309] "Adding apiserver pod source" Feb 9 09:58:55.316437 kubelet[1889]: I0209 09:58:55.316429 1889 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 09:58:55.317160 kubelet[1889]: E0209 09:58:55.317141 1889 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:58:55.317263 kubelet[1889]: E0209 09:58:55.317253 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:58:55.317948 kubelet[1889]: I0209 09:58:55.317932 1889 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 09:58:55.318451 kubelet[1889]: W0209 09:58:55.318436 1889 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 09:58:55.318975 kubelet[1889]: I0209 09:58:55.318958 1889 server.go:1232] "Started kubelet" Feb 9 09:58:55.319846 kubelet[1889]: I0209 09:58:55.319493 1889 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 09:58:55.319846 kubelet[1889]: I0209 09:58:55.319769 1889 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 09:58:55.319846 kubelet[1889]: I0209 09:58:55.319817 1889 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 09:58:55.320494 kubelet[1889]: I0209 09:58:55.320461 1889 server.go:462] "Adding debug handlers to kubelet server" Feb 9 09:58:55.319000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.320743 kubelet[1889]: I0209 09:58:55.320728 1889 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 09:58:55.320833 kubelet[1889]: I0209 09:58:55.320820 1889 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 09:58:55.320943 kubelet[1889]: I0209 09:58:55.320933 1889 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 09:58:55.325840 kernel: kauditd_printk_skb: 361 callbacks suppressed Feb 9 09:58:55.325920 kernel: audit: type=1400 audit(1707472735.319:536): avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.327021 kubelet[1889]: I0209 09:58:55.326997 1889 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 09:58:55.329299 kubelet[1889]: I0209 09:58:55.329276 1889 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 09:58:55.329467 kubelet[1889]: I0209 09:58:55.329455 1889 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 09:58:55.335132 kubelet[1889]: E0209 09:58:55.335110 1889 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 09:58:55.335250 kubelet[1889]: E0209 09:58:55.335238 1889 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 09:58:55.319000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:55.488604 kernel: audit: type=1401 audit(1707472735.319:536): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:55.488672 kernel: audit: type=1300 audit(1707472735.319:536): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d01d10 a1=4000bb8e28 a2=4000d01ce0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.488714 kernel: audit: type=1327 audit(1707472735.319:536): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:55.488736 kernel: audit: type=1400 audit(1707472735.319:537): avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.488757 kernel: audit: type=1401 audit(1707472735.319:537): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:55.488771 kernel: audit: type=1300 audit(1707472735.319:537): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000722d60 a1=4000bb8e40 a2=4000d01da0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.488793 kernel: audit: type=1327 audit(1707472735.319:537): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:55.319000 audit[1889]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d01d10 a1=4000bb8e28 a2=4000d01ce0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.319000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:55.319000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.319000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:55.319000 audit[1889]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000722d60 a1=4000bb8e40 a2=4000d01da0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.319000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:55.489039 kubelet[1889]: I0209 09:58:55.367156 1889 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 09:58:55.489039 kubelet[1889]: I0209 09:58:55.367173 1889 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 09:58:55.489039 kubelet[1889]: I0209 09:58:55.367194 1889 state_mem.go:36] "Initialized new in-memory state store" Feb 9 09:58:55.489039 kubelet[1889]: W0209 09:58:55.395412 1889 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:58:55.489039 kubelet[1889]: E0209 09:58:55.395441 1889 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 09:58:55.489039 kubelet[1889]: W0209 09:58:55.395547 1889 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:58:55.489039 kubelet[1889]: E0209 09:58:55.395571 1889 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 09:58:55.489039 kubelet[1889]: E0209 09:58:55.395609 1889 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 09:58:55.489268 kubelet[1889]: E0209 09:58:55.395631 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967fc59962c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 318939180, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 318939180, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.489268 kubelet[1889]: W0209 09:58:55.395885 1889 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:58:55.489268 kubelet[1889]: E0209 09:58:55.395900 1889 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 09:58:55.489372 kubelet[1889]: E0209 09:58:55.421608 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967fd521b99", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 335226265, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 335226265, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.489372 kubelet[1889]: I0209 09:58:55.427978 1889 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 09:58:55.489448 kubelet[1889]: E0209 09:58:55.444038 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c7da7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364218279, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364218279, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.489448 kubelet[1889]: E0209 09:58:55.444309 1889 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 09:58:55.489516 kubelet[1889]: E0209 09:58:55.454812 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c91cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364223439, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364223439, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.490403 kubelet[1889]: E0209 09:58:55.490329 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0ccf87", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364239239, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364239239, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.322000 audit[1900]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.519449 kubelet[1889]: E0209 09:58:55.519375 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c7da7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364218279, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 427927957, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c7da7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.534803 kernel: audit: type=1325 audit(1707472735.322:538): table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.535029 kernel: audit: type=1300 audit(1707472735.322:538): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffc70b950 a2=0 a3=1 items=0 ppid=1889 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.322000 audit[1900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffc70b950 a2=0 a3=1 items=0 ppid=1889 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.535639 kubelet[1889]: E0209 09:58:55.535564 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c91cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364223439, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 427932517, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c91cf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.322000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:58:55.323000 audit[1901]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1901 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.323000 audit[1901]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd71a9650 a2=0 a3=1 items=0 ppid=1889 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.323000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:58:55.327000 audit[1903]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.327000 audit[1903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2cf3340 a2=0 a3=1 items=0 ppid=1889 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:55.329000 audit[1905]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.329000 audit[1905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe60c7ff0 a2=0 a3=1 items=0 ppid=1889 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:58:55.570600 kubelet[1889]: E0209 09:58:55.570412 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0ccf87", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364239239, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 427948317, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0ccf87" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.573000 audit[1913]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.573000 audit[1913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffce8c3360 a2=0 a3=1 items=0 ppid=1889 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.573000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 09:58:55.574000 audit[1915]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:55.574000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff2604e50 a2=0 a3=1 items=0 ppid=1889 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 09:58:55.575000 audit[1917]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:55.575000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc0dd2490 a2=0 a3=1 items=0 ppid=1889 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.575000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:58:55.576000 audit[1916]: NETFILTER_CFG table=mangle:13 family=2 entries=1 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.576000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc244db20 a2=0 a3=1 items=0 ppid=1889 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.576000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 09:58:55.577000 audit[1918]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:55.577000 audit[1918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe5393b80 a2=0 a3=1 items=0 ppid=1889 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.577000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:58:55.578000 audit[1920]: NETFILTER_CFG table=filter:15 family=10 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:58:55.578000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff138b6d0 a2=0 a3=1 items=0 ppid=1889 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:58:55.578000 audit[1919]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.578000 audit[1919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff0dd4c60 a2=0 a3=1 items=0 ppid=1889 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 09:58:55.579000 audit[1921]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:58:55.579000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff26c87d0 a2=0 a3=1 items=0 ppid=1889 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.579000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 09:58:55.618516 kubelet[1889]: I0209 09:58:55.574977 1889 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 09:58:55.618516 kubelet[1889]: I0209 09:58:55.576031 1889 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 09:58:55.618516 kubelet[1889]: I0209 09:58:55.576057 1889 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 09:58:55.618516 kubelet[1889]: I0209 09:58:55.576154 1889 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 09:58:55.618516 kubelet[1889]: E0209 09:58:55.576210 1889 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 09:58:55.618516 kubelet[1889]: W0209 09:58:55.577733 1889 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:58:55.618516 kubelet[1889]: E0209 09:58:55.577755 1889 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 09:58:55.618516 kubelet[1889]: E0209 09:58:55.597447 1889 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 09:58:55.645615 kubelet[1889]: I0209 09:58:55.645593 1889 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 09:58:55.646844 kubelet[1889]: E0209 09:58:55.646825 1889 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 09:58:55.647219 kubelet[1889]: E0209 09:58:55.647111 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c7da7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364218279, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 645538076, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c7da7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.648046 kubelet[1889]: E0209 09:58:55.647988 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c91cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364223439, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 645553516, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c91cf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.648907 kubelet[1889]: E0209 09:58:55.648858 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0ccf87", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364239239, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 645556356, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0ccf87" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.652671 kubelet[1889]: I0209 09:58:55.652651 1889 policy_none.go:49] "None policy: Start" Feb 9 09:58:55.653497 kubelet[1889]: I0209 09:58:55.653476 1889 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 09:58:55.653609 kubelet[1889]: I0209 09:58:55.653596 1889 state_mem.go:35] "Initializing new in-memory state store" Feb 9 09:58:55.677175 kubelet[1889]: E0209 09:58:55.677147 1889 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 9 09:58:55.689170 systemd[1]: Created slice kubepods.slice. Feb 9 09:58:55.693736 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 09:58:55.702282 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 09:58:55.703760 kubelet[1889]: I0209 09:58:55.703740 1889 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 09:58:55.702000 audit[1889]: AVC avc: denied { mac_admin } for pid=1889 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:58:55.702000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 09:58:55.702000 audit[1889]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f901e0 a1=4000eef8d8 a2=4000f901b0 a3=25 items=0 ppid=1 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:58:55.702000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 09:58:55.704135 kubelet[1889]: I0209 09:58:55.704120 1889 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 09:58:55.704696 kubelet[1889]: I0209 09:58:55.704673 1889 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 09:58:55.705551 kubelet[1889]: E0209 09:58:55.705210 1889 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.44\" not found" Feb 9 09:58:55.707619 kubelet[1889]: E0209 09:58:55.707542 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b229681373af43", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 706525507, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 706525507, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:55.999587 kubelet[1889]: E0209 09:58:55.999557 1889 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 09:58:56.048563 kubelet[1889]: I0209 09:58:56.048538 1889 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 09:58:56.049878 kubelet[1889]: E0209 09:58:56.049847 1889 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 09:58:56.050200 kubelet[1889]: E0209 09:58:56.050125 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c7da7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364218279, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 48478556, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c7da7" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:56.051210 kubelet[1889]: E0209 09:58:56.051136 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0c91cf", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364223439, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 48488196, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0c91cf" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:56.052226 kubelet[1889]: E0209 09:58:56.052165 1889 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b22967ff0ccf87", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 9, 58, 55, 364239239, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 48510595, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b22967ff0ccf87" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 09:58:56.308993 kubelet[1889]: I0209 09:58:56.308889 1889 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 09:58:56.318100 kubelet[1889]: E0209 09:58:56.318051 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:58:56.742379 kubelet[1889]: E0209 09:58:56.742328 1889 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.44" not found Feb 9 09:58:56.803781 kubelet[1889]: E0209 09:58:56.803746 1889 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.44\" not found" node="10.200.20.44" Feb 9 09:58:56.851309 kubelet[1889]: I0209 09:58:56.851274 1889 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 09:58:56.854049 kubelet[1889]: I0209 09:58:56.854024 1889 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.44" Feb 9 09:58:56.880679 kubelet[1889]: I0209 09:58:56.880649 1889 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 09:58:56.881303 env[1357]: time="2024-02-09T09:58:56.881187199Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 09:58:56.881608 kubelet[1889]: I0209 09:58:56.881414 1889 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 09:58:57.132000 audit[1677]: USER_END pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:57.132000 audit[1677]: CRED_DISP pid=1677 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 09:58:57.133405 sudo[1677]: pam_unix(sudo:session): session closed for user root Feb 9 09:58:57.216818 sshd[1674]: pam_unix(sshd:session): session closed for user core Feb 9 09:58:57.217000 audit[1674]: USER_END pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.217000 audit[1674]: CRED_DISP pid=1674 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 09:58:57.219545 systemd[1]: sshd@6-10.200.20.44:22-10.200.12.6:59028.service: Deactivated successfully. Feb 9 09:58:57.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.44:22-10.200.12.6:59028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 09:58:57.220316 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 09:58:57.220952 systemd-logind[1338]: Session 9 logged out. Waiting for processes to exit. Feb 9 09:58:57.221811 systemd-logind[1338]: Removed session 9. Feb 9 09:58:57.318383 kubelet[1889]: I0209 09:58:57.318357 1889 apiserver.go:52] "Watching apiserver" Feb 9 09:58:57.318798 kubelet[1889]: E0209 09:58:57.318431 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:58:57.322261 kubelet[1889]: I0209 09:58:57.322220 1889 topology_manager.go:215] "Topology Admit Handler" podUID="9701dcf2-332a-4478-9733-c8e944ce8af6" podNamespace="calico-system" podName="calico-node-hwnsk" Feb 9 09:58:57.322536 kubelet[1889]: I0209 09:58:57.322520 1889 topology_manager.go:215] "Topology Admit Handler" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" podNamespace="calico-system" podName="csi-node-driver-2hqf7" Feb 9 09:58:57.322702 kubelet[1889]: I0209 09:58:57.322689 1889 topology_manager.go:215] "Topology Admit Handler" podUID="9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4" podNamespace="kube-system" podName="kube-proxy-vxk7v" Feb 9 09:58:57.324953 kubelet[1889]: E0209 09:58:57.324922 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:58:57.329793 systemd[1]: Created slice kubepods-besteffort-pod9ef3cb71_18bd_43a8_9ec1_5aa4c2b7efe4.slice. Feb 9 09:58:57.330429 kubelet[1889]: I0209 09:58:57.330407 1889 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 09:58:57.340127 systemd[1]: Created slice kubepods-besteffort-pod9701dcf2_332a_4478_9733_c8e944ce8af6.slice. Feb 9 09:58:57.340549 kubelet[1889]: I0209 09:58:57.340529 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-lib-modules\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.340649 kubelet[1889]: I0209 09:58:57.340639 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-flexvol-driver-host\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.340735 kubelet[1889]: I0209 09:58:57.340725 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-xtables-lock\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.340806 kubelet[1889]: I0209 09:58:57.340796 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9701dcf2-332a-4478-9733-c8e944ce8af6-tigera-ca-bundle\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.340872 kubelet[1889]: I0209 09:58:57.340862 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-cni-net-dir\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.340942 kubelet[1889]: I0209 09:58:57.340931 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zr5ln\" (UniqueName: \"kubernetes.io/projected/9701dcf2-332a-4478-9733-c8e944ce8af6-kube-api-access-zr5ln\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.341015 kubelet[1889]: I0209 09:58:57.341005 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46-registration-dir\") pod \"csi-node-driver-2hqf7\" (UID: \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\") " pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:58:57.341116 kubelet[1889]: I0209 09:58:57.341105 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4-kube-proxy\") pod \"kube-proxy-vxk7v\" (UID: \"9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4\") " pod="kube-system/kube-proxy-vxk7v" Feb 9 09:58:57.341205 kubelet[1889]: I0209 09:58:57.341195 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4-xtables-lock\") pod \"kube-proxy-vxk7v\" (UID: \"9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4\") " pod="kube-system/kube-proxy-vxk7v" Feb 9 09:58:57.341274 kubelet[1889]: I0209 09:58:57.341265 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9701dcf2-332a-4478-9733-c8e944ce8af6-node-certs\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.341345 kubelet[1889]: I0209 09:58:57.341336 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-var-run-calico\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.341410 kubelet[1889]: I0209 09:58:57.341401 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-cni-log-dir\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.341480 kubelet[1889]: I0209 09:58:57.341471 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46-kubelet-dir\") pod \"csi-node-driver-2hqf7\" (UID: \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\") " pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:58:57.341556 kubelet[1889]: I0209 09:58:57.341547 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4-lib-modules\") pod \"kube-proxy-vxk7v\" (UID: \"9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4\") " pod="kube-system/kube-proxy-vxk7v" Feb 9 09:58:57.341641 kubelet[1889]: I0209 09:58:57.341619 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kkxl4\" (UniqueName: \"kubernetes.io/projected/9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4-kube-api-access-kkxl4\") pod \"kube-proxy-vxk7v\" (UID: \"9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4\") " pod="kube-system/kube-proxy-vxk7v" Feb 9 09:58:57.341714 kubelet[1889]: I0209 09:58:57.341705 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-cni-bin-dir\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.341784 kubelet[1889]: I0209 09:58:57.341774 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46-varrun\") pod \"csi-node-driver-2hqf7\" (UID: \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\") " pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:58:57.341857 kubelet[1889]: I0209 09:58:57.341849 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46-socket-dir\") pod \"csi-node-driver-2hqf7\" (UID: \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\") " pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:58:57.341935 kubelet[1889]: I0209 09:58:57.341926 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-57sgl\" (UniqueName: \"kubernetes.io/projected/ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46-kube-api-access-57sgl\") pod \"csi-node-driver-2hqf7\" (UID: \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\") " pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:58:57.342020 kubelet[1889]: I0209 09:58:57.342004 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-policysync\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.342119 kubelet[1889]: I0209 09:58:57.342108 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9701dcf2-332a-4478-9733-c8e944ce8af6-var-lib-calico\") pod \"calico-node-hwnsk\" (UID: \"9701dcf2-332a-4478-9733-c8e944ce8af6\") " pod="calico-system/calico-node-hwnsk" Feb 9 09:58:57.446448 kubelet[1889]: E0209 09:58:57.445501 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.446602 kubelet[1889]: W0209 09:58:57.446581 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.446692 kubelet[1889]: E0209 09:58:57.446682 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.446964 kubelet[1889]: E0209 09:58:57.446951 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.447039 kubelet[1889]: W0209 09:58:57.447028 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.447147 kubelet[1889]: E0209 09:58:57.447134 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.447385 kubelet[1889]: E0209 09:58:57.447367 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.447385 kubelet[1889]: W0209 09:58:57.447383 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.447472 kubelet[1889]: E0209 09:58:57.447414 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.448220 kubelet[1889]: E0209 09:58:57.448200 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.448220 kubelet[1889]: W0209 09:58:57.448217 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.448318 kubelet[1889]: E0209 09:58:57.448240 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.449517 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451330 kubelet[1889]: W0209 09:58:57.449537 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.449626 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.449774 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451330 kubelet[1889]: W0209 09:58:57.449782 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.449846 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.449938 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451330 kubelet[1889]: W0209 09:58:57.449945 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.450006 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451330 kubelet[1889]: E0209 09:58:57.450109 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451574 kubelet[1889]: W0209 09:58:57.450117 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450135 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450521 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451574 kubelet[1889]: W0209 09:58:57.450531 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450551 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450726 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451574 kubelet[1889]: W0209 09:58:57.450733 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450743 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451574 kubelet[1889]: E0209 09:58:57.450875 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451574 kubelet[1889]: W0209 09:58:57.450891 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451775 kubelet[1889]: E0209 09:58:57.450902 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.451775 kubelet[1889]: E0209 09:58:57.451028 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.451775 kubelet[1889]: W0209 09:58:57.451035 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.451775 kubelet[1889]: E0209 09:58:57.451044 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.457414 kubelet[1889]: E0209 09:58:57.457393 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.457539 kubelet[1889]: W0209 09:58:57.457526 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.457599 kubelet[1889]: E0209 09:58:57.457590 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.457793 kubelet[1889]: E0209 09:58:57.457764 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.457793 kubelet[1889]: W0209 09:58:57.457781 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.457793 kubelet[1889]: E0209 09:58:57.457797 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.466293 kubelet[1889]: E0209 09:58:57.466251 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.466293 kubelet[1889]: W0209 09:58:57.466275 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.466293 kubelet[1889]: E0209 09:58:57.466295 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.466795 kubelet[1889]: E0209 09:58:57.466780 1889 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 09:58:57.466876 kubelet[1889]: W0209 09:58:57.466864 1889 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 09:58:57.466971 kubelet[1889]: E0209 09:58:57.466962 1889 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 09:58:57.639836 env[1357]: time="2024-02-09T09:58:57.639781186Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxk7v,Uid:9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4,Namespace:kube-system,Attempt:0,}" Feb 9 09:58:57.646483 env[1357]: time="2024-02-09T09:58:57.646432671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hwnsk,Uid:9701dcf2-332a-4478-9733-c8e944ce8af6,Namespace:calico-system,Attempt:0,}" Feb 9 09:58:58.319625 kubelet[1889]: E0209 09:58:58.319588 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:58:58.577299 kubelet[1889]: E0209 09:58:58.577099 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:58:59.320426 kubelet[1889]: E0209 09:58:59.320381 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:00.220367 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1205876905.mount: Deactivated successfully. Feb 9 09:59:00.320676 kubelet[1889]: E0209 09:59:00.320634 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:00.458737 env[1357]: time="2024-02-09T09:59:00.458684113Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.552102 env[1357]: time="2024-02-09T09:59:00.551803426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.555474 env[1357]: time="2024-02-09T09:59:00.555435028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.576923 kubelet[1889]: E0209 09:59:00.576549 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:00.603940 env[1357]: time="2024-02-09T09:59:00.603876884Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.712581 env[1357]: time="2024-02-09T09:59:00.712527475Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.757932 env[1357]: time="2024-02-09T09:59:00.757892964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.806136 env[1357]: time="2024-02-09T09:59:00.805844945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:00.852028 env[1357]: time="2024-02-09T09:59:00.851809188Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:01.318200 env[1357]: time="2024-02-09T09:59:01.318133029Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:01.318332 env[1357]: time="2024-02-09T09:59:01.318209749Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:01.318332 env[1357]: time="2024-02-09T09:59:01.318241228Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:01.318571 env[1357]: time="2024-02-09T09:59:01.318521185Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc pid=1953 runtime=io.containerd.runc.v2 Feb 9 09:59:01.321467 kubelet[1889]: E0209 09:59:01.321405 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:01.376191 systemd[1]: run-containerd-runc-k8s.io-cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc-runc.gBFZgP.mount: Deactivated successfully. Feb 9 09:59:01.381841 systemd[1]: Started cri-containerd-cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc.scope. Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.391143 env[1357]: time="2024-02-09T09:59:01.391081052Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:01.391275 env[1357]: time="2024-02-09T09:59:01.391254490Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:01.391368 env[1357]: time="2024-02-09T09:59:01.391348089Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:01.391657 env[1357]: time="2024-02-09T09:59:01.391627686Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3e926d9694e22ad94bda85160acf4a930c3cf6fdbe07d6e8e78a7934c310a05e pid=1979 runtime=io.containerd.runc.v2 Feb 9 09:59:01.396510 kernel: kauditd_printk_skb: 43 callbacks suppressed Feb 9 09:59:01.396587 kernel: audit: type=1400 audit(1707472741.389:556): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.445390 kernel: audit: type=1400 audit(1707472741.389:557): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.447706 systemd[1]: Started cri-containerd-3e926d9694e22ad94bda85160acf4a930c3cf6fdbe07d6e8e78a7934c310a05e.scope. Feb 9 09:59:01.475007 kernel: audit: type=1400 audit(1707472741.389:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.499790 kernel: audit: type=1400 audit(1707472741.389:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.537611 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 09:59:01.537741 kernel: audit: type=1400 audit(1707472741.389:560): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.537762 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 09:59:01.537785 kernel: audit: type=1400 audit(1707472741.389:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.565548 kernel: audit: backlog limit exceeded Feb 9 09:59:01.565646 kernel: audit: type=1400 audit(1707472741.389:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.389000 audit: BPF prog-id=65 op=LOAD Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:01.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376366656136646165303861376234643761303533346465646535 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:01.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376366656136646165303861376234643761303533346465646535 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.405000 audit: BPF prog-id=66 op=LOAD Feb 9 09:59:01.405000 audit[1963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:01.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376366656136646165303861376234643761303533346465646535 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.420000 audit: BPF prog-id=67 op=LOAD Feb 9 09:59:01.420000 audit[1963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:01.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376366656136646165303861376234643761303533346465646535 Feb 9 09:59:01.446000 audit: BPF prog-id=67 op=UNLOAD Feb 9 09:59:01.446000 audit: BPF prog-id=66 op=UNLOAD Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { perfmon } for pid=1963 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit[1963]: AVC avc: denied { bpf } for pid=1963 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.446000 audit: BPF prog-id=68 op=LOAD Feb 9 09:59:01.446000 audit[1963]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1953 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:01.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362376366656136646165303861376234643761303533346465646535 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.588000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:01.588000 audit: BPF prog-id=69 op=LOAD Feb 9 09:59:01.608473 env[1357]: time="2024-02-09T09:59:01.608421655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-hwnsk,Uid:9701dcf2-332a-4478-9733-c8e944ce8af6,Namespace:calico-system,Attempt:0,} returns sandbox id \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\"" Feb 9 09:59:01.610767 env[1357]: time="2024-02-09T09:59:01.610730351Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 09:59:01.616801 env[1357]: time="2024-02-09T09:59:01.616759210Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vxk7v,Uid:9ef3cb71-18bd-43a8-9ec1-5aa4c2b7efe4,Namespace:kube-system,Attempt:0,} returns sandbox id \"3e926d9694e22ad94bda85160acf4a930c3cf6fdbe07d6e8e78a7934c310a05e\"" Feb 9 09:59:02.322234 kubelet[1889]: E0209 09:59:02.322194 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:02.577302 kubelet[1889]: E0209 09:59:02.577202 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:03.322983 kubelet[1889]: E0209 09:59:03.322944 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:04.323485 kubelet[1889]: E0209 09:59:04.323443 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:04.576766 kubelet[1889]: E0209 09:59:04.576661 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:05.323814 kubelet[1889]: E0209 09:59:05.323759 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:05.850660 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1436767680.mount: Deactivated successfully. Feb 9 09:59:06.324314 kubelet[1889]: E0209 09:59:06.324244 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:06.576754 kubelet[1889]: E0209 09:59:06.576643 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:06.664472 env[1357]: time="2024-02-09T09:59:06.664416848Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:06.755278 env[1357]: time="2024-02-09T09:59:06.755050488Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:06.800177 env[1357]: time="2024-02-09T09:59:06.800130811Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:06.857556 env[1357]: time="2024-02-09T09:59:06.857521625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:06.858316 env[1357]: time="2024-02-09T09:59:06.858289138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 09:59:06.860484 env[1357]: time="2024-02-09T09:59:06.860025643Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 09:59:06.860894 env[1357]: time="2024-02-09T09:59:06.860867915Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 09:59:07.016257 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1869140091.mount: Deactivated successfully. Feb 9 09:59:07.217499 env[1357]: time="2024-02-09T09:59:07.217378980Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4\"" Feb 9 09:59:07.218680 env[1357]: time="2024-02-09T09:59:07.218640570Z" level=info msg="StartContainer for \"d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4\"" Feb 9 09:59:07.241220 systemd[1]: Started cri-containerd-d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4.scope. Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266635 kernel: kauditd_printk_skb: 168 callbacks suppressed Feb 9 09:59:07.266733 kernel: audit: type=1400 audit(1707472747.258:584): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1953 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:07.323612 kernel: audit: type=1300 audit(1707472747.258:584): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1953 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:07.324602 kubelet[1889]: E0209 09:59:07.324562 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:07.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430343131393564363634313930656532396230376664336464343934 Feb 9 09:59:07.357593 kernel: audit: type=1327 audit(1707472747.258:584): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430343131393564363634313930656532396230376664336464343934 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.381471 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.406414 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.428396 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.451506 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.451928 env[1357]: time="2024-02-09T09:59:07.451888287Z" level=info msg="StartContainer for \"d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4\" returns successfully" Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.452183 systemd[1]: cri-containerd-d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4.scope: Deactivated successfully. Feb 9 09:59:07.474427 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.497187 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.521559 kernel: audit: type=1400 audit(1707472747.258:585): avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.258000 audit: BPF prog-id=73 op=LOAD Feb 9 09:59:07.258000 audit[2035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1953 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:07.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430343131393564363634313930656532396230376664336464343934 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.266000 audit: BPF prog-id=74 op=LOAD Feb 9 09:59:07.266000 audit[2035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1953 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:07.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430343131393564363634313930656532396230376664336464343934 Feb 9 09:59:07.286000 audit: BPF prog-id=74 op=UNLOAD Feb 9 09:59:07.286000 audit: BPF prog-id=73 op=UNLOAD Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:07.286000 audit: BPF prog-id=75 op=LOAD Feb 9 09:59:07.286000 audit[2035]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1953 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:07.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430343131393564363634313930656532396230376664336464343934 Feb 9 09:59:07.521000 audit: BPF prog-id=75 op=UNLOAD Feb 9 09:59:08.013790 systemd[1]: run-containerd-runc-k8s.io-d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4-runc.qyMrNS.mount: Deactivated successfully. Feb 9 09:59:08.013878 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4-rootfs.mount: Deactivated successfully. Feb 9 09:59:08.325588 kubelet[1889]: E0209 09:59:08.325549 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:08.577291 kubelet[1889]: E0209 09:59:08.577025 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:08.747790 env[1357]: time="2024-02-09T09:59:08.747569211Z" level=info msg="shim disconnected" id=d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4 Feb 9 09:59:08.747790 env[1357]: time="2024-02-09T09:59:08.747631170Z" level=warning msg="cleaning up after shim disconnected" id=d041195d664190ee29b07fd3dd49418fd23674e5ea6d496b4c83b811245903c4 namespace=k8s.io Feb 9 09:59:08.747790 env[1357]: time="2024-02-09T09:59:08.747642090Z" level=info msg="cleaning up dead shim" Feb 9 09:59:08.754823 env[1357]: time="2024-02-09T09:59:08.754780990Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:59:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2080 runtime=io.containerd.runc.v2\n" Feb 9 09:59:09.325794 kubelet[1889]: E0209 09:59:09.325763 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:10.326774 kubelet[1889]: E0209 09:59:10.326726 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:10.407729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1387013862.mount: Deactivated successfully. Feb 9 09:59:10.577644 kubelet[1889]: E0209 09:59:10.577395 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:10.976323 env[1357]: time="2024-02-09T09:59:10.976271939Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:10.992358 env[1357]: time="2024-02-09T09:59:10.992316972Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:10.999663 env[1357]: time="2024-02-09T09:59:10.999625714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:11.006345 env[1357]: time="2024-02-09T09:59:11.006294062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:11.006813 env[1357]: time="2024-02-09T09:59:11.006783738Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 9 09:59:11.008097 env[1357]: time="2024-02-09T09:59:11.008051809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 09:59:11.008987 env[1357]: time="2024-02-09T09:59:11.008955362Z" level=info msg="CreateContainer within sandbox \"3e926d9694e22ad94bda85160acf4a930c3cf6fdbe07d6e8e78a7934c310a05e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 09:59:11.049766 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3925793163.mount: Deactivated successfully. Feb 9 09:59:11.072521 env[1357]: time="2024-02-09T09:59:11.072467751Z" level=info msg="CreateContainer within sandbox \"3e926d9694e22ad94bda85160acf4a930c3cf6fdbe07d6e8e78a7934c310a05e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"43e70f125464000254a2c992ce0c405f2a5da758506cb6a9d3fe51e16ea33242\"" Feb 9 09:59:11.073399 env[1357]: time="2024-02-09T09:59:11.073365944Z" level=info msg="StartContainer for \"43e70f125464000254a2c992ce0c405f2a5da758506cb6a9d3fe51e16ea33242\"" Feb 9 09:59:11.089438 systemd[1]: Started cri-containerd-43e70f125464000254a2c992ce0c405f2a5da758506cb6a9d3fe51e16ea33242.scope. Feb 9 09:59:11.095785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1272446474.mount: Deactivated successfully. Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1979 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653730663132353436343030303235346132633939326365306334 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit: BPF prog-id=76 op=LOAD Feb 9 09:59:11.108000 audit[2100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1979 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653730663132353436343030303235346132633939326365306334 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit: BPF prog-id=77 op=LOAD Feb 9 09:59:11.108000 audit[2100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1979 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653730663132353436343030303235346132633939326365306334 Feb 9 09:59:11.108000 audit: BPF prog-id=77 op=UNLOAD Feb 9 09:59:11.108000 audit: BPF prog-id=76 op=UNLOAD Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { perfmon } for pid=2100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit[2100]: AVC avc: denied { bpf } for pid=2100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:11.108000 audit: BPF prog-id=78 op=LOAD Feb 9 09:59:11.108000 audit[2100]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1979 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433653730663132353436343030303235346132633939326365306334 Feb 9 09:59:11.130491 env[1357]: time="2024-02-09T09:59:11.130428544Z" level=info msg="StartContainer for \"43e70f125464000254a2c992ce0c405f2a5da758506cb6a9d3fe51e16ea33242\" returns successfully" Feb 9 09:59:11.178000 audit[2150]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.178000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9de6280 a2=0 a3=ffff8cfa16c0 items=0 ppid=2111 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:59:11.179000 audit[2151]: NETFILTER_CFG table=nat:19 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.179000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee556f50 a2=0 a3=ffffb9ea16c0 items=0 ppid=2111 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:59:11.181000 audit[2152]: NETFILTER_CFG table=filter:20 family=10 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.181000 audit[2152]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc20bd790 a2=0 a3=ffff9dfef6c0 items=0 ppid=2111 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:59:11.182000 audit[2153]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.182000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca5a0f80 a2=0 a3=ffff9ef7b6c0 items=0 ppid=2111 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 09:59:11.183000 audit[2154]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.183000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe77aaae0 a2=0 a3=ffffba5946c0 items=0 ppid=2111 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 09:59:11.184000 audit[2155]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.184000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff877a5c0 a2=0 a3=ffffa97c76c0 items=0 ppid=2111 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.184000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 09:59:11.283000 audit[2156]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.283000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffcad17b10 a2=0 a3=ffffa18c36c0 items=0 ppid=2111 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:59:11.286000 audit[2158]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.286000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee4a1250 a2=0 a3=ffffb46496c0 items=0 ppid=2111 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 09:59:11.289000 audit[2162]: NETFILTER_CFG table=filter:26 family=2 entries=2 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.289000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe141a350 a2=0 a3=ffff97a836c0 items=0 ppid=2111 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.289000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 09:59:11.290000 audit[2163]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.290000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1af9d70 a2=0 a3=ffff880a66c0 items=0 ppid=2111 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.290000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:59:11.292000 audit[2165]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.292000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea3c5cc0 a2=0 a3=ffffacbda6c0 items=0 ppid=2111 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.292000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:59:11.293000 audit[2166]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.293000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcc00de0 a2=0 a3=ffffb1bec6c0 items=0 ppid=2111 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.293000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:59:11.295000 audit[2168]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.295000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffca91a980 a2=0 a3=ffff91d9f6c0 items=0 ppid=2111 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:59:11.298000 audit[2171]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.298000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc6063490 a2=0 a3=ffff884976c0 items=0 ppid=2111 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 09:59:11.299000 audit[2172]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.299000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee5f6590 a2=0 a3=ffff961f66c0 items=0 ppid=2111 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:59:11.301000 audit[2174]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.301000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd75853f0 a2=0 a3=ffff882b96c0 items=0 ppid=2111 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:59:11.303000 audit[2175]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.303000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7561240 a2=0 a3=ffff91c946c0 items=0 ppid=2111 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:59:11.310000 audit[2177]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.310000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc59d8d30 a2=0 a3=ffffacb2a6c0 items=0 ppid=2111 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.310000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:59:11.313000 audit[2180]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.313000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd30460a0 a2=0 a3=ffff930a16c0 items=0 ppid=2111 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:59:11.316000 audit[2183]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.316000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd0088d90 a2=0 a3=ffff876cd6c0 items=0 ppid=2111 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.316000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:59:11.317000 audit[2184]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.317000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffceec9160 a2=0 a3=ffffb2a346c0 items=0 ppid=2111 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.317000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:59:11.327417 kubelet[1889]: E0209 09:59:11.327353 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:11.319000 audit[2186]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.319000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffde7e2900 a2=0 a3=ffff94a8c6c0 items=0 ppid=2111 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.319000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:59:11.353000 audit[2191]: NETFILTER_CFG table=nat:40 family=2 entries=2 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.353000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd11fbd90 a2=0 a3=ffff82a9d6c0 items=0 ppid=2111 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:59:11.354000 audit[2192]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.354000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd48701e0 a2=0 a3=ffff805856c0 items=0 ppid=2111 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.354000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:59:11.357000 audit[2194]: NETFILTER_CFG table=nat:42 family=2 entries=2 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 09:59:11.357000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe2584f50 a2=0 a3=ffff9024b6c0 items=0 ppid=2111 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:59:11.370000 audit[2200]: NETFILTER_CFG table=filter:43 family=2 entries=5 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:11.370000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffee37baf0 a2=0 a3=ffffa73016c0 items=0 ppid=2111 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.370000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:11.396000 audit[2200]: NETFILTER_CFG table=nat:44 family=2 entries=65 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 09:59:11.396000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffee37baf0 a2=0 a3=ffffa73016c0 items=0 ppid=2111 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:11.412000 audit[2208]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.412000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff2f16ea0 a2=0 a3=ffff8819c6c0 items=0 ppid=2111 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 09:59:11.414000 audit[2210]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.414000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc4c70ef0 a2=0 a3=ffff9681d6c0 items=0 ppid=2111 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.414000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 09:59:11.419000 audit[2213]: NETFILTER_CFG table=filter:47 family=10 entries=2 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.419000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffebe89940 a2=0 a3=ffff992bb6c0 items=0 ppid=2111 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 09:59:11.420000 audit[2214]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.420000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffef986910 a2=0 a3=ffffaca006c0 items=0 ppid=2111 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 09:59:11.422000 audit[2216]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.422000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdbe3b0d0 a2=0 a3=ffffb405c6c0 items=0 ppid=2111 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 09:59:11.423000 audit[2217]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.423000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbfd1a30 a2=0 a3=ffff8c47c6c0 items=0 ppid=2111 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 09:59:11.425000 audit[2219]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.425000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffce6962a0 a2=0 a3=ffffb56856c0 items=0 ppid=2111 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 09:59:11.428000 audit[2222]: NETFILTER_CFG table=filter:52 family=10 entries=2 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.428000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffeadad530 a2=0 a3=ffffbe3e16c0 items=0 ppid=2111 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 09:59:11.429000 audit[2223]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.429000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf9b1ca0 a2=0 a3=ffff9dc8e6c0 items=0 ppid=2111 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 09:59:11.431000 audit[2225]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_rule pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.431000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd1df2b40 a2=0 a3=ffffa19636c0 items=0 ppid=2111 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 09:59:11.432000 audit[2226]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.432000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6acb6e0 a2=0 a3=ffffb36b06c0 items=0 ppid=2111 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 09:59:11.434000 audit[2228]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.434000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe6929790 a2=0 a3=ffff8aabd6c0 items=0 ppid=2111 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.434000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 09:59:11.438000 audit[2231]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.438000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdd170870 a2=0 a3=ffffb926f6c0 items=0 ppid=2111 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 09:59:11.441000 audit[2234]: NETFILTER_CFG table=filter:58 family=10 entries=1 op=nft_register_rule pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.441000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc699fb40 a2=0 a3=ffffaaaf66c0 items=0 ppid=2111 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 09:59:11.443000 audit[2235]: NETFILTER_CFG table=nat:59 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.443000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffda573f0 a2=0 a3=ffff9706e6c0 items=0 ppid=2111 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.443000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 09:59:11.445000 audit[2237]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.445000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffdaf4e250 a2=0 a3=ffffa6de76c0 items=0 ppid=2111 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.445000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:59:11.448000 audit[2240]: NETFILTER_CFG table=nat:61 family=10 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.448000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc0c271b0 a2=0 a3=ffffa84fb6c0 items=0 ppid=2111 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.448000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 09:59:11.449000 audit[2241]: NETFILTER_CFG table=nat:62 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.449000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe049a540 a2=0 a3=ffffb396b6c0 items=0 ppid=2111 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 09:59:11.451000 audit[2243]: NETFILTER_CFG table=nat:63 family=10 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.451000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff8cfa720 a2=0 a3=ffffb126d6c0 items=0 ppid=2111 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 09:59:11.452000 audit[2244]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.452000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeff47f70 a2=0 a3=ffffa56b66c0 items=0 ppid=2111 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 09:59:11.454000 audit[2246]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.454000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc8e37ed0 a2=0 a3=ffffbb5736c0 items=0 ppid=2111 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:59:11.457000 audit[2249]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 09:59:11.457000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd48f8640 a2=0 a3=ffff81f826c0 items=0 ppid=2111 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 09:59:11.459000 audit[2251]: NETFILTER_CFG table=filter:67 family=10 entries=3 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:59:11.459000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff604e460 a2=0 a3=ffff835296c0 items=0 ppid=2111 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.459000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:11.460000 audit[2251]: NETFILTER_CFG table=nat:68 family=10 entries=7 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 09:59:11.460000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffff604e460 a2=0 a3=ffff835296c0 items=0 ppid=2111 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:11.460000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 09:59:11.621426 kubelet[1889]: I0209 09:59:11.621390 1889 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-vxk7v" podStartSLOduration=6.232108936 podCreationTimestamp="2024-02-09 09:58:56 +0000 UTC" firstStartedPulling="2024-02-09 09:59:01.617993798 +0000 UTC m=+7.502659238" lastFinishedPulling="2024-02-09 09:59:11.007227735 +0000 UTC m=+16.891893175" observedRunningTime="2024-02-09 09:59:11.621102275 +0000 UTC m=+17.505768035" watchObservedRunningTime="2024-02-09 09:59:11.621342873 +0000 UTC m=+17.506008313" Feb 9 09:59:12.328088 kubelet[1889]: E0209 09:59:12.328040 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:12.577671 kubelet[1889]: E0209 09:59:12.577357 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:12.871821 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1401910039.mount: Deactivated successfully. Feb 9 09:59:13.328804 kubelet[1889]: E0209 09:59:13.328696 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:14.329657 kubelet[1889]: E0209 09:59:14.329626 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:14.576618 kubelet[1889]: E0209 09:59:14.576579 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:15.316570 kubelet[1889]: E0209 09:59:15.316542 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:15.330913 kubelet[1889]: E0209 09:59:15.330895 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:16.331480 kubelet[1889]: E0209 09:59:16.331443 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:16.576818 kubelet[1889]: E0209 09:59:16.576785 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:17.332049 kubelet[1889]: E0209 09:59:17.332013 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:18.333034 kubelet[1889]: E0209 09:59:18.332995 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:18.576929 kubelet[1889]: E0209 09:59:18.576878 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:19.333480 kubelet[1889]: E0209 09:59:19.333447 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:20.333632 kubelet[1889]: E0209 09:59:20.333594 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:20.576622 kubelet[1889]: E0209 09:59:20.576594 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:21.334644 kubelet[1889]: E0209 09:59:21.334601 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:21.601680 env[1357]: time="2024-02-09T09:59:21.601453892Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:21.649899 env[1357]: time="2024-02-09T09:59:21.649853363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:21.714860 env[1357]: time="2024-02-09T09:59:21.714811574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:21.759789 env[1357]: time="2024-02-09T09:59:21.759741625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:21.760348 env[1357]: time="2024-02-09T09:59:21.760259982Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 09:59:21.762244 env[1357]: time="2024-02-09T09:59:21.762208290Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 09:59:21.960875 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3611816961.mount: Deactivated successfully. Feb 9 09:59:22.107773 env[1357]: time="2024-02-09T09:59:22.107704918Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4\"" Feb 9 09:59:22.108541 env[1357]: time="2024-02-09T09:59:22.108514593Z" level=info msg="StartContainer for \"3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4\"" Feb 9 09:59:22.128940 systemd[1]: run-containerd-runc-k8s.io-3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4-runc.oWMyCQ.mount: Deactivated successfully. Feb 9 09:59:22.131899 systemd[1]: Started cri-containerd-3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4.scope. Feb 9 09:59:22.172791 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 9 09:59:22.172917 kernel: audit: type=1400 audit(1707472762.142:648): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1953 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:22.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303864643162656633353035366262653337643230326135623834 Feb 9 09:59:22.242590 kernel: audit: type=1300 audit(1707472762.142:648): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1953 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:22.242719 kernel: audit: type=1327 audit(1707472762.142:648): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303864643162656633353035366262653337643230326135623834 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.270329 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.358306 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.358396 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.358415 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.358434 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.358553 kubelet[1889]: E0209 09:59:22.335447 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.362242 env[1357]: time="2024-02-09T09:59:22.362196193Z" level=info msg="StartContainer for \"3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4\" returns successfully" Feb 9 09:59:22.382173 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.403616 kernel: audit: type=1400 audit(1707472762.142:649): avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.142000 audit: BPF prog-id=79 op=LOAD Feb 9 09:59:22.142000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1953 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:22.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303864643162656633353035366262653337643230326135623834 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.149000 audit: BPF prog-id=80 op=LOAD Feb 9 09:59:22.149000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1953 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:22.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303864643162656633353035366262653337643230326135623834 Feb 9 09:59:22.171000 audit: BPF prog-id=80 op=UNLOAD Feb 9 09:59:22.171000 audit: BPF prog-id=79 op=UNLOAD Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { perfmon } for pid=2260 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit[2260]: AVC avc: denied { bpf } for pid=2260 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:22.171000 audit: BPF prog-id=81 op=LOAD Feb 9 09:59:22.171000 audit[2260]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1953 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:22.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336303864643162656633353035366262653337643230326135623834 Feb 9 09:59:22.577276 kubelet[1889]: E0209 09:59:22.577172 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:23.335970 kubelet[1889]: E0209 09:59:23.335934 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:24.336888 kubelet[1889]: E0209 09:59:24.336849 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:24.577368 kubelet[1889]: E0209 09:59:24.577326 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:25.337003 kubelet[1889]: E0209 09:59:25.336955 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:26.337800 kubelet[1889]: E0209 09:59:26.337769 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:26.577223 kubelet[1889]: E0209 09:59:26.577191 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:27.338733 kubelet[1889]: E0209 09:59:27.338696 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:28.339341 kubelet[1889]: E0209 09:59:28.339304 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:28.577169 kubelet[1889]: E0209 09:59:28.577132 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:29.340643 kubelet[1889]: E0209 09:59:29.340615 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:30.341967 kubelet[1889]: E0209 09:59:30.341934 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:30.576425 kubelet[1889]: E0209 09:59:30.576382 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:30.990369 systemd[1]: cri-containerd-3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4.scope: Deactivated successfully. Feb 9 09:59:30.993000 audit: BPF prog-id=81 op=UNLOAD Feb 9 09:59:31.000373 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 09:59:31.000508 kernel: audit: type=1334 audit(1707472770.993:654): prog-id=81 op=UNLOAD Feb 9 09:59:31.013946 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4-rootfs.mount: Deactivated successfully. Feb 9 09:59:31.020429 kubelet[1889]: I0209 09:59:31.020401 1889 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 09:59:31.343120 kubelet[1889]: E0209 09:59:31.342698 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:31.742330 env[1357]: time="2024-02-09T09:59:31.742285473Z" level=info msg="shim disconnected" id=3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4 Feb 9 09:59:31.742735 env[1357]: time="2024-02-09T09:59:31.742715791Z" level=warning msg="cleaning up after shim disconnected" id=3608dd1bef35056bbe37d202a5b84b449e6987d9dedd82b7500cbc6dce3a61e4 namespace=k8s.io Feb 9 09:59:31.742800 env[1357]: time="2024-02-09T09:59:31.742787751Z" level=info msg="cleaning up dead shim" Feb 9 09:59:31.750239 env[1357]: time="2024-02-09T09:59:31.750198316Z" level=warning msg="cleanup warnings time=\"2024-02-09T09:59:31Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2306 runtime=io.containerd.runc.v2\n" Feb 9 09:59:32.343432 kubelet[1889]: E0209 09:59:32.343377 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:32.581494 systemd[1]: Created slice kubepods-besteffort-podef5dfc8d_5aa1_4a0d_beff_9b3f8249cb46.slice. Feb 9 09:59:32.583823 env[1357]: time="2024-02-09T09:59:32.583780166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hqf7,Uid:ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46,Namespace:calico-system,Attempt:0,}" Feb 9 09:59:32.655676 env[1357]: time="2024-02-09T09:59:32.655634275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 09:59:32.721588 env[1357]: time="2024-02-09T09:59:32.721521451Z" level=error msg="Failed to destroy network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:32.722953 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b-shm.mount: Deactivated successfully. Feb 9 09:59:32.724201 env[1357]: time="2024-02-09T09:59:32.724153919Z" level=error msg="encountered an error cleaning up failed sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:32.724337 env[1357]: time="2024-02-09T09:59:32.724311958Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hqf7,Uid:ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:32.725292 kubelet[1889]: E0209 09:59:32.725252 1889 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:32.725388 kubelet[1889]: E0209 09:59:32.725328 1889 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:59:32.725388 kubelet[1889]: E0209 09:59:32.725360 1889 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-2hqf7" Feb 9 09:59:32.725449 kubelet[1889]: E0209 09:59:32.725409 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-2hqf7_calico-system(ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-2hqf7_calico-system(ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:33.344184 kubelet[1889]: E0209 09:59:33.344149 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:33.654010 kubelet[1889]: I0209 09:59:33.653967 1889 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 09:59:33.654899 env[1357]: time="2024-02-09T09:59:33.654863815Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 09:59:33.676877 env[1357]: time="2024-02-09T09:59:33.676815476Z" level=error msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" failed" error="failed to destroy network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:33.677155 kubelet[1889]: E0209 09:59:33.677129 1889 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 09:59:33.677225 kubelet[1889]: E0209 09:59:33.677210 1889 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b"} Feb 9 09:59:33.677278 kubelet[1889]: E0209 09:59:33.677264 1889 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:33.677339 kubelet[1889]: E0209 09:59:33.677297 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:34.345052 kubelet[1889]: E0209 09:59:34.345005 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:34.733047 kubelet[1889]: I0209 09:59:34.733005 1889 topology_manager.go:215] "Topology Admit Handler" podUID="ae767df5-2f19-4e2a-a246-b3dfa0a050e3" podNamespace="default" podName="nginx-deployment-6d5f899847-fz48l" Feb 9 09:59:34.737324 systemd[1]: Created slice kubepods-besteffort-podae767df5_2f19_4e2a_a246_b3dfa0a050e3.slice. Feb 9 09:59:34.836499 kubelet[1889]: I0209 09:59:34.836423 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-whpfb\" (UniqueName: \"kubernetes.io/projected/ae767df5-2f19-4e2a-a246-b3dfa0a050e3-kube-api-access-whpfb\") pod \"nginx-deployment-6d5f899847-fz48l\" (UID: \"ae767df5-2f19-4e2a-a246-b3dfa0a050e3\") " pod="default/nginx-deployment-6d5f899847-fz48l" Feb 9 09:59:35.062098 env[1357]: time="2024-02-09T09:59:35.061959702Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fz48l,Uid:ae767df5-2f19-4e2a-a246-b3dfa0a050e3,Namespace:default,Attempt:0,}" Feb 9 09:59:35.317725 kubelet[1889]: E0209 09:59:35.317414 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:35.345432 kubelet[1889]: E0209 09:59:35.345380 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:36.345738 kubelet[1889]: E0209 09:59:36.345702 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:37.347213 kubelet[1889]: E0209 09:59:37.347178 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:38.348672 kubelet[1889]: E0209 09:59:38.348634 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:39.349548 kubelet[1889]: E0209 09:59:39.349508 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:40.350494 kubelet[1889]: E0209 09:59:40.350440 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:40.428930 env[1357]: time="2024-02-09T09:59:40.428876889Z" level=error msg="Failed to destroy network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.430709 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861-shm.mount: Deactivated successfully. Feb 9 09:59:40.431980 env[1357]: time="2024-02-09T09:59:40.431935837Z" level=error msg="encountered an error cleaning up failed sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.432131 env[1357]: time="2024-02-09T09:59:40.432105157Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fz48l,Uid:ae767df5-2f19-4e2a-a246-b3dfa0a050e3,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.432788 kubelet[1889]: E0209 09:59:40.432419 1889 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.432788 kubelet[1889]: E0209 09:59:40.432474 1889 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-fz48l" Feb 9 09:59:40.432788 kubelet[1889]: E0209 09:59:40.432493 1889 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-fz48l" Feb 9 09:59:40.432959 kubelet[1889]: E0209 09:59:40.432537 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-fz48l_default(ae767df5-2f19-4e2a-a246-b3dfa0a050e3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-fz48l_default(ae767df5-2f19-4e2a-a246-b3dfa0a050e3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-fz48l" podUID="ae767df5-2f19-4e2a-a246-b3dfa0a050e3" Feb 9 09:59:40.668698 kubelet[1889]: I0209 09:59:40.668664 1889 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:40.669419 env[1357]: time="2024-02-09T09:59:40.669376997Z" level=info msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" Feb 9 09:59:40.721977 env[1357]: time="2024-02-09T09:59:40.721907474Z" level=error msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" failed" error="failed to destroy network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:40.722241 kubelet[1889]: E0209 09:59:40.722214 1889 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:40.722299 kubelet[1889]: E0209 09:59:40.722263 1889 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861"} Feb 9 09:59:40.722326 kubelet[1889]: E0209 09:59:40.722311 1889 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae767df5-2f19-4e2a-a246-b3dfa0a050e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:40.722390 kubelet[1889]: E0209 09:59:40.722339 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae767df5-2f19-4e2a-a246-b3dfa0a050e3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-fz48l" podUID="ae767df5-2f19-4e2a-a246-b3dfa0a050e3" Feb 9 09:59:41.350843 kubelet[1889]: E0209 09:59:41.350802 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:42.351855 kubelet[1889]: E0209 09:59:42.351815 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:43.229838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount846591063.mount: Deactivated successfully. Feb 9 09:59:43.352303 kubelet[1889]: E0209 09:59:43.352268 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:44.353119 kubelet[1889]: E0209 09:59:44.353057 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:45.354123 kubelet[1889]: E0209 09:59:45.354076 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:46.354785 kubelet[1889]: E0209 09:59:46.354746 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:47.355423 kubelet[1889]: E0209 09:59:47.355389 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:47.578489 env[1357]: time="2024-02-09T09:59:47.578448511Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 09:59:48.356452 kubelet[1889]: E0209 09:59:48.356420 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:48.871157 env[1357]: time="2024-02-09T09:59:48.802736720Z" level=error msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" failed" error="failed to destroy network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 09:59:48.871480 kubelet[1889]: E0209 09:59:48.802969 1889 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 09:59:48.871480 kubelet[1889]: E0209 09:59:48.803007 1889 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b"} Feb 9 09:59:48.871480 kubelet[1889]: E0209 09:59:48.803039 1889 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 09:59:48.871480 kubelet[1889]: E0209 09:59:48.803094 1889 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-2hqf7" podUID="ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46" Feb 9 09:59:49.357259 kubelet[1889]: E0209 09:59:49.357230 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:50.358290 kubelet[1889]: E0209 09:59:50.358230 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:51.358605 kubelet[1889]: E0209 09:59:51.358563 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:51.790472 env[1357]: time="2024-02-09T09:59:51.790168697Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:51.798296 env[1357]: time="2024-02-09T09:59:51.798039112Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:51.803427 env[1357]: time="2024-02-09T09:59:51.802342819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:51.809313 env[1357]: time="2024-02-09T09:59:51.809272837Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:51.809692 env[1357]: time="2024-02-09T09:59:51.809667396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 09:59:51.823014 env[1357]: time="2024-02-09T09:59:51.822974354Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 09:59:51.932109 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount837837834.mount: Deactivated successfully. Feb 9 09:59:51.953362 env[1357]: time="2024-02-09T09:59:51.953303507Z" level=info msg="CreateContainer within sandbox \"cb7cfea6dae08a7b4d7a0534dede51345214ab91133bdfade9965082896a42bc\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2\"" Feb 9 09:59:51.954302 env[1357]: time="2024-02-09T09:59:51.954262904Z" level=info msg="StartContainer for \"b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2\"" Feb 9 09:59:51.972758 systemd[1]: Started cri-containerd-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2.scope. Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1953 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:52.044218 kernel: audit: type=1400 audit(1707472791.990:655): avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.044358 kernel: audit: type=1300 audit(1707472791.990:655): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1953 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:51.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232663839623634343532363239633832333165373865353538366462 Feb 9 09:59:52.073410 kernel: audit: type=1327 audit(1707472791.990:655): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232663839623634343532363239633832333165373865353538366462 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.096033 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.118899 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.140624 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.146892 env[1357]: time="2024-02-09T09:59:52.146840751Z" level=info msg="StartContainer for \"b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2\" returns successfully" Feb 9 09:59:52.162796 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.184468 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.205888 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:52.206005 kernel: audit: type=1400 audit(1707472791.990:656): avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit: BPF prog-id=82 op=LOAD Feb 9 09:59:51.990000 audit[2451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1953 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:51.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232663839623634343532363239633832333165373865353538366462 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.990000 audit: BPF prog-id=83 op=LOAD Feb 9 09:59:51.990000 audit[2451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1953 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:51.990000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232663839623634343532363239633832333165373865353538366462 Feb 9 09:59:51.991000 audit: BPF prog-id=83 op=UNLOAD Feb 9 09:59:51.991000 audit: BPF prog-id=82 op=UNLOAD Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { perfmon } for pid=2451 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit[2451]: AVC avc: denied { bpf } for pid=2451 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:51.991000 audit: BPF prog-id=84 op=LOAD Feb 9 09:59:51.991000 audit[2451]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1953 pid=2451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:51.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232663839623634343532363239633832333165373865353538366462 Feb 9 09:59:52.298778 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 09:59:52.298916 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 09:59:52.359649 kubelet[1889]: E0209 09:59:52.359589 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:52.703495 kubelet[1889]: I0209 09:59:52.703176 1889 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-hwnsk" podStartSLOduration=6.50264621 podCreationTimestamp="2024-02-09 09:58:56 +0000 UTC" firstStartedPulling="2024-02-09 09:59:01.60991252 +0000 UTC m=+7.494577920" lastFinishedPulling="2024-02-09 09:59:51.810387074 +0000 UTC m=+57.695052514" observedRunningTime="2024-02-09 09:59:52.701829568 +0000 UTC m=+58.586495008" watchObservedRunningTime="2024-02-09 09:59:52.703120804 +0000 UTC m=+58.587786244" Feb 9 09:59:53.359947 kubelet[1889]: E0209 09:59:53.359895 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:53.580000 audit[2593]: AVC avc: denied { write } for pid=2593 comm="tee" name="fd" dev="proc" ino=18475 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.580000 audit[2593]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc7ade979 a2=241 a3=1b6 items=1 ppid=2543 pid=2593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.580000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 09:59:53.580000 audit: PATH item=0 name="/dev/fd/63" inode=18466 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.583000 audit[2588]: AVC avc: denied { write } for pid=2588 comm="tee" name="fd" dev="proc" ino=18482 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.583000 audit[2588]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe86d397a a2=241 a3=1b6 items=1 ppid=2539 pid=2588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.583000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 09:59:53.583000 audit: PATH item=0 name="/dev/fd/63" inode=17689 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.583000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.586000 audit[2598]: AVC avc: denied { write } for pid=2598 comm="tee" name="fd" dev="proc" ino=18486 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.586000 audit[2598]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe453397b a2=241 a3=1b6 items=1 ppid=2548 pid=2598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.586000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 09:59:53.586000 audit: PATH item=0 name="/dev/fd/63" inode=17694 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.586000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.587000 audit[2592]: AVC avc: denied { write } for pid=2592 comm="tee" name="fd" dev="proc" ino=18491 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.587000 audit[2592]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc96ff96a a2=241 a3=1b6 items=1 ppid=2544 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.587000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 09:59:53.587000 audit: PATH item=0 name="/dev/fd/63" inode=17690 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.587000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.589000 audit[2601]: AVC avc: denied { write } for pid=2601 comm="tee" name="fd" dev="proc" ino=18495 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.589000 audit[2601]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe204979 a2=241 a3=1b6 items=1 ppid=2551 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.589000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 09:59:53.589000 audit: PATH item=0 name="/dev/fd/63" inode=18477 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.589000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.592000 audit[2606]: AVC avc: denied { write } for pid=2606 comm="tee" name="fd" dev="proc" ino=18499 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.592000 audit[2606]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe213b969 a2=241 a3=1b6 items=1 ppid=2547 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.592000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 09:59:53.592000 audit: PATH item=0 name="/dev/fd/63" inode=18488 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.592000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.593000 audit[2595]: AVC avc: denied { write } for pid=2595 comm="tee" name="fd" dev="proc" ino=17697 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 09:59:53.593000 audit[2595]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7217979 a2=241 a3=1b6 items=1 ppid=2541 pid=2595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.593000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 09:59:53.593000 audit: PATH item=0 name="/dev/fd/63" inode=18467 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 09:59:53.593000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 09:59:53.712458 systemd[1]: run-containerd-runc-k8s.io-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2-runc.ZLHiUY.mount: Deactivated successfully. Feb 9 09:59:53.824120 kernel: Initializing XFRM netlink socket Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit: BPF prog-id=85 op=LOAD Feb 9 09:59:53.954000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff03afd08 a2=70 a3=0 items=0 ppid=2542 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:53.954000 audit: BPF prog-id=85 op=UNLOAD Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit: BPF prog-id=86 op=LOAD Feb 9 09:59:53.954000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff03afd08 a2=70 a3=4a174c items=0 ppid=2542 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:53.954000 audit: BPF prog-id=86 op=UNLOAD Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff03afd38 a2=70 a3=100db79f items=0 ppid=2542 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { perfmon } for pid=2702 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit[2702]: AVC avc: denied { bpf } for pid=2702 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.954000 audit: BPF prog-id=87 op=LOAD Feb 9 09:59:53.954000 audit[2702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff03afc88 a2=70 a3=100db7b9 items=0 ppid=2542 pid=2702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.954000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 09:59:53.960000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.960000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcc125a58 a2=70 a3=0 items=0 ppid=2542 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:59:53.960000 audit[2707]: AVC avc: denied { bpf } for pid=2707 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:53.960000 audit[2707]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcc125938 a2=70 a3=2 items=0 ppid=2542 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:53.960000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 09:59:53.966000 audit: BPF prog-id=87 op=UNLOAD Feb 9 09:59:54.038000 audit[2729]: NETFILTER_CFG table=mangle:69 family=2 entries=19 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.038000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd1f72ec0 a2=0 a3=ffffb3924fa8 items=0 ppid=2542 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.040000 audit[2728]: NETFILTER_CFG table=nat:70 family=2 entries=16 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.040000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffe2cead70 a2=0 a3=ffffbf11bfa8 items=0 ppid=2542 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.042000 audit[2730]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.042000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffffef19dc0 a2=0 a3=ffff8db25fa8 items=0 ppid=2542 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.042000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.047000 audit[2725]: NETFILTER_CFG table=raw:72 family=2 entries=19 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:54.047000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffff585c5b0 a2=0 a3=ffff81e29fa8 items=0 ppid=2542 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:54.047000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:54.360756 kubelet[1889]: E0209 09:59:54.360715 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:54.577761 env[1357]: time="2024-02-09T09:59:54.577705650Z" level=info msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.627 [INFO][2751] k8s.go 578: Cleaning up netns ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.627 [INFO][2751] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" iface="eth0" netns="/var/run/netns/cni-661eb3ca-620e-3d02-d82e-954ec1862852" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.627 [INFO][2751] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" iface="eth0" netns="/var/run/netns/cni-661eb3ca-620e-3d02-d82e-954ec1862852" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.628 [INFO][2751] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" iface="eth0" netns="/var/run/netns/cni-661eb3ca-620e-3d02-d82e-954ec1862852" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.628 [INFO][2751] k8s.go 585: Releasing IP address(es) ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.628 [INFO][2751] utils.go 188: Calico CNI releasing IP address ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.646 [INFO][2757] ipam_plugin.go 415: Releasing address using handleID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.646 [INFO][2757] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.646 [INFO][2757] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.669 [WARNING][2757] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.669 [INFO][2757] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.671 [INFO][2757] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:54.673863 env[1357]: 2024-02-09 09:59:54.672 [INFO][2751] k8s.go 591: Teardown processing complete. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 09:59:54.675927 env[1357]: time="2024-02-09T09:59:54.675884639Z" level=info msg="TearDown network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" successfully" Feb 9 09:59:54.676047 env[1357]: time="2024-02-09T09:59:54.676030159Z" level=info msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" returns successfully" Feb 9 09:59:54.677059 systemd[1]: run-netns-cni\x2d661eb3ca\x2d620e\x2d3d02\x2dd82e\x2d954ec1862852.mount: Deactivated successfully. Feb 9 09:59:54.678088 env[1357]: time="2024-02-09T09:59:54.678030433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fz48l,Uid:ae767df5-2f19-4e2a-a246-b3dfa0a050e3,Namespace:default,Attempt:1,}" Feb 9 09:59:55.316484 kubelet[1889]: E0209 09:59:55.316437 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:55.361879 kubelet[1889]: E0209 09:59:55.361846 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:55.571125 systemd-networkd[1484]: vxlan.calico: Link UP Feb 9 09:59:55.571135 systemd-networkd[1484]: vxlan.calico: Gained carrier Feb 9 09:59:56.032031 systemd-networkd[1484]: calif79c2029d33: Link UP Feb 9 09:59:56.049801 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 09:59:56.049914 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif79c2029d33: link becomes ready Feb 9 09:59:56.050484 systemd-networkd[1484]: calif79c2029d33: Gained carrier Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:55.971 [INFO][2769] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0 nginx-deployment-6d5f899847- default ae767df5-2f19-4e2a-a246-b3dfa0a050e3 1238 0 2024-02-09 09:59:34 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 nginx-deployment-6d5f899847-fz48l eth0 default [] [] [kns.default ksa.default.default] calif79c2029d33 [] []}} ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:55.971 [INFO][2769] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:55.994 [INFO][2780] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" HandleID="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.006 [INFO][2780] ipam_plugin.go 268: Auto assigning IP ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" HandleID="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400021f9a0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"nginx-deployment-6d5f899847-fz48l", "timestamp":"2024-02-09 09:59:55.994302227 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.006 [INFO][2780] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.006 [INFO][2780] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.006 [INFO][2780] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.007 [INFO][2780] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.010 [INFO][2780] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.014 [INFO][2780] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.015 [INFO][2780] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.017 [INFO][2780] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.017 [INFO][2780] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.019 [INFO][2780] ipam.go 1682: Creating new handle: k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13 Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.022 [INFO][2780] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.025 [INFO][2780] ipam.go 1216: Successfully claimed IPs: [192.168.8.129/26] block=192.168.8.128/26 handle="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.025 [INFO][2780] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.129/26] handle="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" host="10.200.20.44" Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.025 [INFO][2780] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 09:59:56.076777 env[1357]: 2024-02-09 09:59:56.025 [INFO][2780] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.129/26] IPv6=[] ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" HandleID="k8s-pod-network.6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.027 [INFO][2769] k8s.go 385: Populated endpoint ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"ae767df5-2f19-4e2a-a246-b3dfa0a050e3", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 59, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"nginx-deployment-6d5f899847-fz48l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif79c2029d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.028 [INFO][2769] k8s.go 386: Calico CNI using IPs: [192.168.8.129/32] ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.028 [INFO][2769] dataplane_linux.go 68: Setting the host side veth name to calif79c2029d33 ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.050 [INFO][2769] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.051 [INFO][2769] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"ae767df5-2f19-4e2a-a246-b3dfa0a050e3", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 59, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13", Pod:"nginx-deployment-6d5f899847-fz48l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif79c2029d33", MAC:"d6:35:b9:9b:2a:79", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 09:59:56.077597 env[1357]: 2024-02-09 09:59:56.075 [INFO][2769] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13" Namespace="default" Pod="nginx-deployment-6d5f899847-fz48l" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 09:59:56.096721 env[1357]: time="2024-02-09T09:59:56.096643294Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 09:59:56.096721 env[1357]: time="2024-02-09T09:59:56.096684254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 09:59:56.096936 env[1357]: time="2024-02-09T09:59:56.096694334Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 09:59:56.095000 audit[2809]: NETFILTER_CFG table=filter:73 family=2 entries=36 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 09:59:56.097224 env[1357]: time="2024-02-09T09:59:56.097050413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13 pid=2812 runtime=io.containerd.runc.v2 Feb 9 09:59:56.095000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffe2be67f0 a2=0 a3=ffffa7bd8fa8 items=0 ppid=2542 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.095000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 09:59:56.118374 systemd[1]: Started cri-containerd-6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13.scope. Feb 9 09:59:56.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.128000 audit: BPF prog-id=88 op=LOAD Feb 9 09:59:56.129000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.129000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=2812 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353131313935313961366361353233623737633962393162393465 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=2812 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353131313935313961366361353233623737633962393162393465 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit: BPF prog-id=89 op=LOAD Feb 9 09:59:56.130000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=2812 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353131313935313961366361353233623737633962393162393465 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit: BPF prog-id=90 op=LOAD Feb 9 09:59:56.130000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=2812 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353131313935313961366361353233623737633962393162393465 Feb 9 09:59:56.130000 audit: BPF prog-id=90 op=UNLOAD Feb 9 09:59:56.130000 audit: BPF prog-id=89 op=UNLOAD Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { perfmon } for pid=2822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit[2822]: AVC avc: denied { bpf } for pid=2822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 09:59:56.130000 audit: BPF prog-id=91 op=LOAD Feb 9 09:59:56.130000 audit[2822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=2812 pid=2822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 09:59:56.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639353131313935313961366361353233623737633962393162393465 Feb 9 09:59:56.150995 env[1357]: time="2024-02-09T09:59:56.150935219Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-fz48l,Uid:ae767df5-2f19-4e2a-a246-b3dfa0a050e3,Namespace:default,Attempt:1,} returns sandbox id \"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13\"" Feb 9 09:59:56.152951 env[1357]: time="2024-02-09T09:59:56.152908253Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 09:59:56.362358 kubelet[1889]: E0209 09:59:56.362300 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:56.926928 systemd[1]: run-containerd-runc-k8s.io-6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13-runc.rZXfG5.mount: Deactivated successfully. Feb 9 09:59:57.236263 systemd-networkd[1484]: vxlan.calico: Gained IPv6LL Feb 9 09:59:57.363452 kubelet[1889]: E0209 09:59:57.363402 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:58.068178 systemd-networkd[1484]: calif79c2029d33: Gained IPv6LL Feb 9 09:59:58.364247 kubelet[1889]: E0209 09:59:58.364212 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:59.034553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3489407730.mount: Deactivated successfully. Feb 9 09:59:59.365318 kubelet[1889]: E0209 09:59:59.365286 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 09:59:59.378548 systemd[1]: run-containerd-runc-k8s.io-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2-runc.scUC7E.mount: Deactivated successfully. Feb 9 09:59:59.971567 env[1357]: time="2024-02-09T09:59:59.971519529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:59.980765 env[1357]: time="2024-02-09T09:59:59.980712424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:59.985967 env[1357]: time="2024-02-09T09:59:59.985919770Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:59.993031 env[1357]: time="2024-02-09T09:59:59.992982391Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 09:59:59.993704 env[1357]: time="2024-02-09T09:59:59.993668189Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 09:59:59.996182 env[1357]: time="2024-02-09T09:59:59.996138662Z" level=info msg="CreateContainer within sandbox \"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 10:00:00.021724 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3911838752.mount: Deactivated successfully. Feb 9 10:00:00.037874 env[1357]: time="2024-02-09T10:00:00.037815510Z" level=info msg="CreateContainer within sandbox \"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"9a941c238703fac2af720fba58420d94e39932458cf92eff434ad75a56b26677\"" Feb 9 10:00:00.038671 env[1357]: time="2024-02-09T10:00:00.038645468Z" level=info msg="StartContainer for \"9a941c238703fac2af720fba58420d94e39932458cf92eff434ad75a56b26677\"" Feb 9 10:00:00.053391 systemd[1]: Started cri-containerd-9a941c238703fac2af720fba58420d94e39932458cf92eff434ad75a56b26677.scope. Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.073760 kernel: kauditd_printk_skb: 189 callbacks suppressed Feb 9 10:00:00.073878 kernel: audit: type=1400 audit(1707472800.066:700): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.115772 kernel: audit: type=1400 audit(1707472800.066:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.137719 kernel: audit: type=1400 audit(1707472800.066:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.160275 kernel: audit: type=1400 audit(1707472800.066:703): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.183926 kernel: audit: type=1400 audit(1707472800.066:704): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.206556 kernel: audit: type=1400 audit(1707472800.066:705): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.228215 kernel: audit: type=1400 audit(1707472800.066:706): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.258586 kernel: audit: type=1400 audit(1707472800.066:707): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.279134 kernel: audit: type=1400 audit(1707472800.066:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.279320 env[1357]: time="2024-02-09T10:00:00.232545389Z" level=info msg="StartContainer for \"9a941c238703fac2af720fba58420d94e39932458cf92eff434ad75a56b26677\" returns successfully" Feb 9 10:00:00.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.300174 kernel: audit: type=1400 audit(1707472800.066:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit: BPF prog-id=92 op=LOAD Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2812 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:00.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393431633233383730336661633261663732306662613538343230 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2812 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:00.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393431633233383730336661633261663732306662613538343230 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.066000 audit: BPF prog-id=93 op=LOAD Feb 9 10:00:00.066000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2812 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:00.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393431633233383730336661633261663732306662613538343230 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.077000 audit: BPF prog-id=94 op=LOAD Feb 9 10:00:00.077000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2812 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:00.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393431633233383730336661633261663732306662613538343230 Feb 9 10:00:00.094000 audit: BPF prog-id=94 op=UNLOAD Feb 9 10:00:00.094000 audit: BPF prog-id=93 op=UNLOAD Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:00.094000 audit: BPF prog-id=95 op=LOAD Feb 9 10:00:00.094000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2812 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:00.094000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961393431633233383730336661633261663732306662613538343230 Feb 9 10:00:00.365851 kubelet[1889]: E0209 10:00:00.365806 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:00.714488 kubelet[1889]: I0209 10:00:00.714448 1889 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-fz48l" podStartSLOduration=22.872155128 podCreationTimestamp="2024-02-09 09:59:34 +0000 UTC" firstStartedPulling="2024-02-09 09:59:56.152336775 +0000 UTC m=+62.037002215" lastFinishedPulling="2024-02-09 09:59:59.994590546 +0000 UTC m=+65.879255946" observedRunningTime="2024-02-09 10:00:00.71399374 +0000 UTC m=+66.598659180" watchObservedRunningTime="2024-02-09 10:00:00.714408859 +0000 UTC m=+66.599074259" Feb 9 10:00:01.366248 kubelet[1889]: E0209 10:00:01.366205 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:01.578552 env[1357]: time="2024-02-09T10:00:01.578365370Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.629 [INFO][2942] k8s.go 578: Cleaning up netns ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.629 [INFO][2942] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" iface="eth0" netns="/var/run/netns/cni-a421cd5a-684f-79b9-8f8d-f12357d81d0b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.629 [INFO][2942] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" iface="eth0" netns="/var/run/netns/cni-a421cd5a-684f-79b9-8f8d-f12357d81d0b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.629 [INFO][2942] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" iface="eth0" netns="/var/run/netns/cni-a421cd5a-684f-79b9-8f8d-f12357d81d0b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.630 [INFO][2942] k8s.go 585: Releasing IP address(es) ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.630 [INFO][2942] utils.go 188: Calico CNI releasing IP address ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.648 [INFO][2948] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.648 [INFO][2948] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.648 [INFO][2948] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.664 [WARNING][2948] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.664 [INFO][2948] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.665 [INFO][2948] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:01.668324 env[1357]: 2024-02-09 10:00:01.666 [INFO][2942] k8s.go 591: Teardown processing complete. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:01.670379 systemd[1]: run-netns-cni\x2da421cd5a\x2d684f\x2d79b9\x2d8f8d\x2df12357d81d0b.mount: Deactivated successfully. Feb 9 10:00:01.672228 env[1357]: time="2024-02-09T10:00:01.672185283Z" level=info msg="TearDown network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" successfully" Feb 9 10:00:01.672338 env[1357]: time="2024-02-09T10:00:01.672320483Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" returns successfully" Feb 9 10:00:01.673415 env[1357]: time="2024-02-09T10:00:01.673370440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hqf7,Uid:ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46,Namespace:calico-system,Attempt:1,}" Feb 9 10:00:01.822427 systemd-networkd[1484]: cali0ef1562ce7e: Link UP Feb 9 10:00:01.839161 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:00:01.839663 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0ef1562ce7e: link becomes ready Feb 9 10:00:01.839525 systemd-networkd[1484]: cali0ef1562ce7e: Gained carrier Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.751 [INFO][2954] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-csi--node--driver--2hqf7-eth0 csi-node-driver- calico-system ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46 1269 0 2024-02-09 09:58:56 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 csi-node-driver-2hqf7 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali0ef1562ce7e [] []}} ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.751 [INFO][2954] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.777 [INFO][2966] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" HandleID="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.793 [INFO][2966] ipam_plugin.go 268: Auto assigning IP ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" HandleID="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.44", "pod":"csi-node-driver-2hqf7", "timestamp":"2024-02-09 10:00:01.777811565 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.794 [INFO][2966] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.794 [INFO][2966] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.794 [INFO][2966] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.795 [INFO][2966] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.799 [INFO][2966] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.802 [INFO][2966] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.804 [INFO][2966] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.806 [INFO][2966] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.806 [INFO][2966] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.809 [INFO][2966] ipam.go 1682: Creating new handle: k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.813 [INFO][2966] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.818 [INFO][2966] ipam.go 1216: Successfully claimed IPs: [192.168.8.130/26] block=192.168.8.128/26 handle="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.818 [INFO][2966] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.130/26] handle="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" host="10.200.20.44" Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.818 [INFO][2966] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:01.864147 env[1357]: 2024-02-09 10:00:01.818 [INFO][2966] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.130/26] IPv6=[] ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" HandleID="k8s-pod-network.0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.820 [INFO][2954] k8s.go 385: Populated endpoint ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--2hqf7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"csi-node-driver-2hqf7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0ef1562ce7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.820 [INFO][2954] k8s.go 386: Calico CNI using IPs: [192.168.8.130/32] ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.820 [INFO][2954] dataplane_linux.go 68: Setting the host side veth name to cali0ef1562ce7e ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.840 [INFO][2954] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.840 [INFO][2954] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--2hqf7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46", ResourceVersion:"1269", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b", Pod:"csi-node-driver-2hqf7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0ef1562ce7e", MAC:"6a:21:45:5b:94:a0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:01.864742 env[1357]: 2024-02-09 10:00:01.857 [INFO][2954] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b" Namespace="calico-system" Pod="csi-node-driver-2hqf7" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:01.875000 audit[2991]: NETFILTER_CFG table=filter:74 family=2 entries=40 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:00:01.875000 audit[2991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffe6e71420 a2=0 a3=ffff872fafa8 items=0 ppid=2542 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.875000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:00:01.879575 env[1357]: time="2024-02-09T10:00:01.879512897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:00:01.879863 env[1357]: time="2024-02-09T10:00:01.879555457Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:00:01.879863 env[1357]: time="2024-02-09T10:00:01.879566817Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:00:01.879863 env[1357]: time="2024-02-09T10:00:01.879781496Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b pid=2999 runtime=io.containerd.runc.v2 Feb 9 10:00:01.897112 systemd[1]: Started cri-containerd-0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b.scope. Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.907000 audit: BPF prog-id=96 op=LOAD Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2999 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306164356434666466396535336465333933323838633361396633 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2999 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306164356434666466396535336465333933323838633361396633 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.908000 audit: BPF prog-id=97 op=LOAD Feb 9 10:00:01.908000 audit[3010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2999 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306164356434666466396535336465333933323838633361396633 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.909000 audit: BPF prog-id=98 op=LOAD Feb 9 10:00:01.909000 audit[3010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2999 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306164356434666466396535336465333933323838633361396633 Feb 9 10:00:01.909000 audit: BPF prog-id=98 op=UNLOAD Feb 9 10:00:01.910000 audit: BPF prog-id=97 op=UNLOAD Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { perfmon } for pid=3010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit[3010]: AVC avc: denied { bpf } for pid=3010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:01.910000 audit: BPF prog-id=99 op=LOAD Feb 9 10:00:01.910000 audit[3010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2999 pid=3010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:01.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065306164356434666466396535336465333933323838633361396633 Feb 9 10:00:01.925281 env[1357]: time="2024-02-09T10:00:01.925168136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-2hqf7,Uid:ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46,Namespace:calico-system,Attempt:1,} returns sandbox id \"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b\"" Feb 9 10:00:01.927442 env[1357]: time="2024-02-09T10:00:01.927404530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:00:02.366748 kubelet[1889]: E0209 10:00:02.366706 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:02.670397 systemd[1]: run-containerd-runc-k8s.io-0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b-runc.hL3fpz.mount: Deactivated successfully. Feb 9 10:00:03.367861 kubelet[1889]: E0209 10:00:03.367807 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:03.828263 systemd-networkd[1484]: cali0ef1562ce7e: Gained IPv6LL Feb 9 10:00:04.368705 kubelet[1889]: E0209 10:00:04.368667 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:05.368964 kubelet[1889]: E0209 10:00:05.368916 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:06.369058 kubelet[1889]: E0209 10:00:06.369025 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:07.282000 audit[3043]: NETFILTER_CFG table=filter:75 family=2 entries=20 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.289765 kernel: kauditd_printk_skb: 107 callbacks suppressed Feb 9 10:00:07.289827 kernel: audit: type=1325 audit(1707472807.282:737): table=filter:75 family=2 entries=20 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.282000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffcac6e6a0 a2=0 a3=ffffaf1d86c0 items=0 ppid=2111 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.341626 kernel: audit: type=1300 audit(1707472807.282:737): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffcac6e6a0 a2=0 a3=ffffaf1d86c0 items=0 ppid=2111 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.342289 kubelet[1889]: I0209 10:00:07.342258 1889 topology_manager.go:215] "Topology Admit Handler" podUID="9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841" podNamespace="default" podName="nfs-server-provisioner-0" Feb 9 10:00:07.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.360001 kernel: audit: type=1327 audit(1707472807.282:737): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.282000 audit[3043]: NETFILTER_CFG table=nat:76 family=2 entries=22 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.377352 kernel: audit: type=1325 audit(1707472807.282:738): table=nat:76 family=2 entries=22 op=nft_register_rule pid=3043 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.377939 kubelet[1889]: E0209 10:00:07.377893 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:07.282000 audit[3043]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffcac6e6a0 a2=0 a3=ffffaf1d86c0 items=0 ppid=2111 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.412255 kubelet[1889]: I0209 10:00:07.393675 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841-data\") pod \"nfs-server-provisioner-0\" (UID: \"9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841\") " pod="default/nfs-server-provisioner-0" Feb 9 10:00:07.412255 kubelet[1889]: I0209 10:00:07.393721 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zm4sq\" (UniqueName: \"kubernetes.io/projected/9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841-kube-api-access-zm4sq\") pod \"nfs-server-provisioner-0\" (UID: \"9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841\") " pod="default/nfs-server-provisioner-0" Feb 9 10:00:07.282000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.428670 kernel: audit: type=1300 audit(1707472807.282:738): arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffcac6e6a0 a2=0 a3=ffffaf1d86c0 items=0 ppid=2111 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.428759 kernel: audit: type=1327 audit(1707472807.282:738): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.348000 audit[3047]: NETFILTER_CFG table=filter:77 family=2 entries=32 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.429649 systemd[1]: Created slice kubepods-besteffort-pod9e25a3a8_4e0a_4c7c_b7f7_ee179d64b841.slice. Feb 9 10:00:07.445453 kernel: audit: type=1325 audit(1707472807.348:739): table=filter:77 family=2 entries=32 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.348000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffe7560890 a2=0 a3=ffffa0a576c0 items=0 ppid=2111 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.480111 kernel: audit: type=1300 audit(1707472807.348:739): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffe7560890 a2=0 a3=ffffa0a576c0 items=0 ppid=2111 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.496595 kernel: audit: type=1327 audit(1707472807.348:739): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.496698 kernel: audit: type=1325 audit(1707472807.379:740): table=nat:78 family=2 entries=22 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.379000 audit[3047]: NETFILTER_CFG table=nat:78 family=2 entries=22 op=nft_register_rule pid=3047 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:07.379000 audit[3047]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffe7560890 a2=0 a3=ffffa0a576c0 items=0 ppid=2111 pid=3047 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:07.379000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:07.799120 env[1357]: time="2024-02-09T10:00:07.798699988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841,Namespace:default,Attempt:0,}" Feb 9 10:00:07.957485 systemd-networkd[1484]: cali60e51b789ff: Link UP Feb 9 10:00:07.972560 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:00:07.972739 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 10:00:07.973419 systemd-networkd[1484]: cali60e51b789ff: Gained carrier Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.886 [INFO][3050] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841 1306 0 2024-02-09 10:00:07 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.44 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.886 [INFO][3050] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.910 [INFO][3062] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" HandleID="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.930 [INFO][3062] ipam_plugin.go 268: Auto assigning IP ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" HandleID="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a9a40), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 10:00:07.910096279 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.930 [INFO][3062] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.930 [INFO][3062] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.930 [INFO][3062] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.932 [INFO][3062] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.935 [INFO][3062] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.939 [INFO][3062] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.940 [INFO][3062] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.943 [INFO][3062] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.943 [INFO][3062] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.944 [INFO][3062] ipam.go 1682: Creating new handle: k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1 Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.947 [INFO][3062] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.952 [INFO][3062] ipam.go 1216: Successfully claimed IPs: [192.168.8.131/26] block=192.168.8.128/26 handle="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.952 [INFO][3062] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.131/26] handle="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" host="10.200.20.44" Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.952 [INFO][3062] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:07.986779 env[1357]: 2024-02-09 10:00:07.952 [INFO][3062] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.131/26] IPv6=[] ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" HandleID="k8s-pod-network.c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.987382 env[1357]: 2024-02-09 10:00:07.954 [INFO][3050] k8s.go 385: Populated endpoint ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:07.987382 env[1357]: 2024-02-09 10:00:07.954 [INFO][3050] k8s.go 386: Calico CNI using IPs: [192.168.8.131/32] ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.987382 env[1357]: 2024-02-09 10:00:07.955 [INFO][3050] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.987382 env[1357]: 2024-02-09 10:00:07.973 [INFO][3050] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:07.987525 env[1357]: 2024-02-09 10:00:07.975 [INFO][3050] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841", ResourceVersion:"1306", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 7, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"ce:b2:ef:31:a4:54", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:07.987525 env[1357]: 2024-02-09 10:00:07.982 [INFO][3050] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:00:08.001000 audit[3084]: NETFILTER_CFG table=filter:79 family=2 entries=38 op=nft_register_chain pid=3084 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:00:08.001000 audit[3084]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffc053aec0 a2=0 a3=ffffb0a14fa8 items=0 ppid=2542 pid=3084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.001000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:00:08.015088 env[1357]: time="2024-02-09T10:00:08.014985387Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:00:08.015481 env[1357]: time="2024-02-09T10:00:08.015441826Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:00:08.015535 env[1357]: time="2024-02-09T10:00:08.015503506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:00:08.015753 env[1357]: time="2024-02-09T10:00:08.015711146Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1 pid=3092 runtime=io.containerd.runc.v2 Feb 9 10:00:08.033155 systemd[1]: Started cri-containerd-c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1.scope. Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.043000 audit: BPF prog-id=100 op=LOAD Feb 9 10:00:08.044000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.044000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3092 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333437643265643464343864376439616161353832613436646565 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3092 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333437643265643464343864376439616161353832613436646565 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit: BPF prog-id=101 op=LOAD Feb 9 10:00:08.045000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3092 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333437643265643464343864376439616161353832613436646565 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.045000 audit: BPF prog-id=102 op=LOAD Feb 9 10:00:08.045000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3092 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333437643265643464343864376439616161353832613436646565 Feb 9 10:00:08.046000 audit: BPF prog-id=102 op=UNLOAD Feb 9 10:00:08.046000 audit: BPF prog-id=101 op=UNLOAD Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:08.046000 audit: BPF prog-id=103 op=LOAD Feb 9 10:00:08.046000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3092 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:08.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331333437643265643464343864376439616161353832613436646565 Feb 9 10:00:08.074336 env[1357]: time="2024-02-09T10:00:08.071813732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:9e25a3a8-4e0a-4c7c-b7f7-ee179d64b841,Namespace:default,Attempt:0,} returns sandbox id \"c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1\"" Feb 9 10:00:08.378801 kubelet[1889]: E0209 10:00:08.378749 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:08.506871 systemd[1]: run-containerd-runc-k8s.io-c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1-runc.HxOMsQ.mount: Deactivated successfully. Feb 9 10:00:09.379137 kubelet[1889]: E0209 10:00:09.379094 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:09.908209 systemd-networkd[1484]: cali60e51b789ff: Gained IPv6LL Feb 9 10:00:10.379717 kubelet[1889]: E0209 10:00:10.379674 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:11.380785 kubelet[1889]: E0209 10:00:11.380747 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:12.381395 kubelet[1889]: E0209 10:00:12.381355 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:13.381864 kubelet[1889]: E0209 10:00:13.381827 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:14.383154 kubelet[1889]: E0209 10:00:14.383115 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:15.316690 kubelet[1889]: E0209 10:00:15.316658 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:15.384020 kubelet[1889]: E0209 10:00:15.383993 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:16.385348 kubelet[1889]: E0209 10:00:16.385311 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:17.386377 kubelet[1889]: E0209 10:00:17.386346 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:18.387712 kubelet[1889]: E0209 10:00:18.387678 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:19.388374 kubelet[1889]: E0209 10:00:19.388335 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:20.388580 kubelet[1889]: E0209 10:00:20.388541 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:21.389440 kubelet[1889]: E0209 10:00:21.389403 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:22.390081 kubelet[1889]: E0209 10:00:22.390028 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:23.391136 kubelet[1889]: E0209 10:00:23.391100 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:24.386686 env[1357]: time="2024-02-09T10:00:24.386630998Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:24.391574 kubelet[1889]: E0209 10:00:24.391530 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:24.393240 env[1357]: time="2024-02-09T10:00:24.393203185Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:24.396544 env[1357]: time="2024-02-09T10:00:24.396512739Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:24.401496 env[1357]: time="2024-02-09T10:00:24.401460489Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:24.402022 env[1357]: time="2024-02-09T10:00:24.401987808Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:00:24.403453 env[1357]: time="2024-02-09T10:00:24.403412165Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 10:00:24.404435 env[1357]: time="2024-02-09T10:00:24.404405203Z" level=info msg="CreateContainer within sandbox \"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:00:24.442736 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2951325182.mount: Deactivated successfully. Feb 9 10:00:24.460528 env[1357]: time="2024-02-09T10:00:24.460475693Z" level=info msg="CreateContainer within sandbox \"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"73f236703c7bb8a2adeaa3e642bf92e55dd6076e86bf97ef2465d87f789df535\"" Feb 9 10:00:24.461475 env[1357]: time="2024-02-09T10:00:24.461384572Z" level=info msg="StartContainer for \"73f236703c7bb8a2adeaa3e642bf92e55dd6076e86bf97ef2465d87f789df535\"" Feb 9 10:00:24.486612 systemd[1]: run-containerd-runc-k8s.io-73f236703c7bb8a2adeaa3e642bf92e55dd6076e86bf97ef2465d87f789df535-runc.0AxzvV.mount: Deactivated successfully. Feb 9 10:00:24.487959 systemd[1]: Started cri-containerd-73f236703c7bb8a2adeaa3e642bf92e55dd6076e86bf97ef2465d87f789df535.scope. Feb 9 10:00:24.507086 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 10:00:24.507207 kernel: audit: type=1400 audit(1707472824.505:760): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.505000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.505000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2999 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:24.566899 kernel: audit: type=1300 audit(1707472824.505:760): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2999 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:24.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663233363730336337626238613261646561613365363432626639 Feb 9 10:00:24.597714 kernel: audit: type=1327 audit(1707472824.505:760): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663233363730336337626238613261646561613365363432626639 Feb 9 10:00:24.597790 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.638930 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.660226 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.660350 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.700624 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.721558 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.721981 env[1357]: time="2024-02-09T10:00:24.721937301Z" level=info msg="StartContainer for \"73f236703c7bb8a2adeaa3e642bf92e55dd6076e86bf97ef2465d87f789df535\" returns successfully" Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.742879 kernel: audit: type=1400 audit(1707472824.506:761): avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.506000 audit: BPF prog-id=104 op=LOAD Feb 9 10:00:24.506000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2999 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:24.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663233363730336337626238613261646561613365363432626639 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.512000 audit: BPF prog-id=105 op=LOAD Feb 9 10:00:24.512000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2999 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:24.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663233363730336337626238613261646561613365363432626639 Feb 9 10:00:24.533000 audit: BPF prog-id=105 op=UNLOAD Feb 9 10:00:24.533000 audit: BPF prog-id=104 op=UNLOAD Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { perfmon } for pid=3148 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit[3148]: AVC avc: denied { bpf } for pid=3148 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:24.533000 audit: BPF prog-id=106 op=LOAD Feb 9 10:00:24.533000 audit[3148]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2999 pid=3148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:24.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663233363730336337626238613261646561613365363432626639 Feb 9 10:00:25.392474 kubelet[1889]: E0209 10:00:25.392435 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:26.392614 kubelet[1889]: E0209 10:00:26.392544 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:27.226888 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3173566099.mount: Deactivated successfully. Feb 9 10:00:27.392669 kubelet[1889]: E0209 10:00:27.392622 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:28.392865 kubelet[1889]: E0209 10:00:28.392826 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:29.220574 env[1357]: time="2024-02-09T10:00:29.220521545Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:29.231843 env[1357]: time="2024-02-09T10:00:29.231794164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:29.236261 env[1357]: time="2024-02-09T10:00:29.236205956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:29.243607 env[1357]: time="2024-02-09T10:00:29.243556822Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:29.243938 env[1357]: time="2024-02-09T10:00:29.243901462Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 10:00:29.244991 env[1357]: time="2024-02-09T10:00:29.244954260Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:00:29.247034 env[1357]: time="2024-02-09T10:00:29.247001936Z" level=info msg="CreateContainer within sandbox \"c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 10:00:29.294298 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3464051567.mount: Deactivated successfully. Feb 9 10:00:29.318784 env[1357]: time="2024-02-09T10:00:29.318730082Z" level=info msg="CreateContainer within sandbox \"c1347d2ed4d48d7d9aaa582a46dee2bf4bd18b11f6118291597683dfe23a9bd1\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"ce88494a50c65d1bc594226e28e1a4d0543745b54c0807e26f7033493cd1e589\"" Feb 9 10:00:29.319679 env[1357]: time="2024-02-09T10:00:29.319643840Z" level=info msg="StartContainer for \"ce88494a50c65d1bc594226e28e1a4d0543745b54c0807e26f7033493cd1e589\"" Feb 9 10:00:29.337907 systemd[1]: Started cri-containerd-ce88494a50c65d1bc594226e28e1a4d0543745b54c0807e26f7033493cd1e589.scope. Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.350000 audit: BPF prog-id=107 op=LOAD Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c1b38 a2=10 a3=0 items=0 ppid=3092 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383834393461353063363564316263353934323236653238653161 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c15a0 a2=3c a3=0 items=0 ppid=3092 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383834393461353063363564316263353934323236653238653161 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit: BPF prog-id=108 op=LOAD Feb 9 10:00:29.351000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c18e0 a2=78 a3=0 items=0 ppid=3092 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383834393461353063363564316263353934323236653238653161 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit: BPF prog-id=109 op=LOAD Feb 9 10:00:29.351000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c1670 a2=78 a3=0 items=0 ppid=3092 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383834393461353063363564316263353934323236653238653161 Feb 9 10:00:29.351000 audit: BPF prog-id=109 op=UNLOAD Feb 9 10:00:29.351000 audit: BPF prog-id=108 op=UNLOAD Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { perfmon } for pid=3184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit[3184]: AVC avc: denied { bpf } for pid=3184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:29.351000 audit: BPF prog-id=110 op=LOAD Feb 9 10:00:29.351000 audit[3184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c1b40 a2=78 a3=0 items=0 ppid=3092 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365383834393461353063363564316263353934323236653238653161 Feb 9 10:00:29.381735 env[1357]: time="2024-02-09T10:00:29.381685005Z" level=info msg="StartContainer for \"ce88494a50c65d1bc594226e28e1a4d0543745b54c0807e26f7033493cd1e589\" returns successfully" Feb 9 10:00:29.393438 kubelet[1889]: E0209 10:00:29.393375 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:29.416000 audit[3234]: AVC avc: denied { search } for pid=3234 comm="rpcbind" name="crypto" dev="proc" ino=21325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:00:29.416000 audit[3234]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffac77f000 a2=0 a3=0 items=0 ppid=3195 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 key=(null) Feb 9 10:00:29.416000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 10:00:29.459000 audit[3241]: AVC avc: denied { search } for pid=3241 comm="dbus-daemon" name="crypto" dev="proc" ino=21325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:00:29.459000 audit[3241]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa9eaf000 a2=0 a3=0 items=0 ppid=3195 pid=3241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 key=(null) Feb 9 10:00:29.459000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:00:29.463000 audit[3242]: AVC avc: denied { watch } for pid=3242 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537949 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c151,c937 tclass=dir permissive=0 Feb 9 10:00:29.463000 audit[3242]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab10bf7ce0 a2=2c8 a3=aaab10bf3a60 items=0 ppid=3195 pid=3242 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 key=(null) Feb 9 10:00:29.463000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:00:29.468000 audit[3243]: AVC avc: denied { read } for pid=3243 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21418 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 10:00:29.468000 audit[3243]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff917aa570 a2=80000 a3=0 items=0 ppid=3195 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 key=(null) Feb 9 10:00:29.468000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:00:29.469000 audit[3243]: AVC avc: denied { search } for pid=3243 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21325 scontext=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:00:29.469000 audit[3243]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff90b3f000 a2=0 a3=0 items=0 ppid=3195 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c151,c937 key=(null) Feb 9 10:00:29.469000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:00:29.775947 kubelet[1889]: I0209 10:00:29.775813 1889 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=1.607266171 podCreationTimestamp="2024-02-09 10:00:07 +0000 UTC" firstStartedPulling="2024-02-09 10:00:08.075733163 +0000 UTC m=+73.960398603" lastFinishedPulling="2024-02-09 10:00:29.244243541 +0000 UTC m=+95.128909061" observedRunningTime="2024-02-09 10:00:29.774919231 +0000 UTC m=+95.659584671" watchObservedRunningTime="2024-02-09 10:00:29.775776629 +0000 UTC m=+95.660442029" Feb 9 10:00:29.797000 audit[3248]: NETFILTER_CFG table=filter:80 family=2 entries=20 op=nft_register_rule pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.804625 kernel: kauditd_printk_skb: 105 callbacks suppressed Feb 9 10:00:29.804697 kernel: audit: type=1325 audit(1707472829.797:789): table=filter:80 family=2 entries=20 op=nft_register_rule pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.797000 audit[3248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcffb76d0 a2=0 a3=ffffb822f6c0 items=0 ppid=2111 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.856428 kernel: audit: type=1300 audit(1707472829.797:789): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcffb76d0 a2=0 a3=ffffb822f6c0 items=0 ppid=2111 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:29.874755 kernel: audit: type=1327 audit(1707472829.797:789): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:29.874914 kernel: audit: type=1325 audit(1707472829.797:790): table=nat:81 family=2 entries=106 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.797000 audit[3248]: NETFILTER_CFG table=nat:81 family=2 entries=106 op=nft_register_chain pid=3248 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:00:29.797000 audit[3248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffcffb76d0 a2=0 a3=ffffb822f6c0 items=0 ppid=2111 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.925244 kernel: audit: type=1300 audit(1707472829.797:790): arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffcffb76d0 a2=0 a3=ffffb822f6c0 items=0 ppid=2111 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:29.797000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:29.941233 kernel: audit: type=1327 audit(1707472829.797:790): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:00:30.394595 kubelet[1889]: E0209 10:00:30.394531 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:31.395626 kubelet[1889]: E0209 10:00:31.395591 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:32.396090 kubelet[1889]: E0209 10:00:32.396025 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:33.396695 kubelet[1889]: E0209 10:00:33.396647 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:34.397803 kubelet[1889]: E0209 10:00:34.397758 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:35.317210 kubelet[1889]: E0209 10:00:35.317174 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:35.397922 kubelet[1889]: E0209 10:00:35.397889 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:36.398543 kubelet[1889]: E0209 10:00:36.398511 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:37.399878 kubelet[1889]: E0209 10:00:37.399844 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:38.400880 kubelet[1889]: E0209 10:00:38.400843 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:39.401733 kubelet[1889]: E0209 10:00:39.401700 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:40.402578 kubelet[1889]: E0209 10:00:40.402539 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:41.402783 kubelet[1889]: E0209 10:00:41.402745 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:42.403835 kubelet[1889]: E0209 10:00:42.403794 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:42.953797 env[1357]: time="2024-02-09T10:00:42.953745392Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:42.960344 env[1357]: time="2024-02-09T10:00:42.960302061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:42.966021 env[1357]: time="2024-02-09T10:00:42.965980331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:42.971242 env[1357]: time="2024-02-09T10:00:42.971203642Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:00:42.971805 env[1357]: time="2024-02-09T10:00:42.971771121Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:00:42.974164 env[1357]: time="2024-02-09T10:00:42.974131517Z" level=info msg="CreateContainer within sandbox \"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:00:43.000111 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3304620227.mount: Deactivated successfully. Feb 9 10:00:43.015706 env[1357]: time="2024-02-09T10:00:43.015656088Z" level=info msg="CreateContainer within sandbox \"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"25ae81903cc743623cea1b57d2283d71b562a90c220411d90df02665438b4c79\"" Feb 9 10:00:43.016437 env[1357]: time="2024-02-09T10:00:43.016410926Z" level=info msg="StartContainer for \"25ae81903cc743623cea1b57d2283d71b562a90c220411d90df02665438b4c79\"" Feb 9 10:00:43.040526 systemd[1]: run-containerd-runc-k8s.io-25ae81903cc743623cea1b57d2283d71b562a90c220411d90df02665438b4c79-runc.xvXpLE.mount: Deactivated successfully. Feb 9 10:00:43.042184 systemd[1]: Started cri-containerd-25ae81903cc743623cea1b57d2283d71b562a90c220411d90df02665438b4c79.scope. Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2999 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.112087 kernel: audit: type=1400 audit(1707472843.056:791): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.112208 kernel: audit: type=1300 audit(1707472843.056:791): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2999 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616538313930336363373433363233636561316235376432323833 Feb 9 10:00:43.142043 kernel: audit: type=1327 audit(1707472843.056:791): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616538313930336363373433363233636561316235376432323833 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.163660 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.185728 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.206403 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.227804 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.249420 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.270910 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.291931 kernel: audit: type=1400 audit(1707472843.056:792): avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.056000 audit: BPF prog-id=111 op=LOAD Feb 9 10:00:43.056000 audit[3281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2999 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.292466 env[1357]: time="2024-02-09T10:00:43.292361425Z" level=info msg="StartContainer for \"25ae81903cc743623cea1b57d2283d71b562a90c220411d90df02665438b4c79\" returns successfully" Feb 9 10:00:43.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616538313930336363373433363233636561316235376432323833 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.078000 audit: BPF prog-id=112 op=LOAD Feb 9 10:00:43.078000 audit[3281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2999 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616538313930336363373433363233636561316235376432323833 Feb 9 10:00:43.111000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:00:43.111000 audit: BPF prog-id=111 op=UNLOAD Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { perfmon } for pid=3281 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit[3281]: AVC avc: denied { bpf } for pid=3281 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:00:43.111000 audit: BPF prog-id=113 op=LOAD Feb 9 10:00:43.111000 audit[3281]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2999 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:43.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235616538313930336363373433363233636561316235376432323833 Feb 9 10:00:43.404710 kubelet[1889]: E0209 10:00:43.404656 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:43.771826 kubelet[1889]: I0209 10:00:43.771795 1889 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:00:43.771962 kubelet[1889]: I0209 10:00:43.771846 1889 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:00:43.803540 kubelet[1889]: I0209 10:00:43.803501 1889 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-2hqf7" podStartSLOduration=66.757826422 podCreationTimestamp="2024-02-09 09:58:56 +0000 UTC" firstStartedPulling="2024-02-09 10:00:01.926791772 +0000 UTC m=+67.811457212" lastFinishedPulling="2024-02-09 10:00:42.97243124 +0000 UTC m=+108.857096680" observedRunningTime="2024-02-09 10:00:43.802172732 +0000 UTC m=+109.686838172" watchObservedRunningTime="2024-02-09 10:00:43.80346589 +0000 UTC m=+109.688131330" Feb 9 10:00:44.405363 kubelet[1889]: E0209 10:00:44.405325 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:45.406170 kubelet[1889]: E0209 10:00:45.406123 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:46.406683 kubelet[1889]: E0209 10:00:46.406646 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:47.408044 kubelet[1889]: E0209 10:00:47.407997 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:48.408324 kubelet[1889]: E0209 10:00:48.408291 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:49.409442 kubelet[1889]: E0209 10:00:49.409401 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:50.410050 kubelet[1889]: E0209 10:00:50.410014 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:51.411054 kubelet[1889]: E0209 10:00:51.411017 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:52.411527 kubelet[1889]: E0209 10:00:52.411489 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:53.412098 kubelet[1889]: E0209 10:00:53.412051 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:54.412906 kubelet[1889]: E0209 10:00:54.412868 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:55.317086 kubelet[1889]: E0209 10:00:55.317026 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:55.414005 kubelet[1889]: E0209 10:00:55.413969 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:55.493941 env[1357]: time="2024-02-09T10:00:55.493897512Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.532 [WARNING][3328] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--2hqf7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46", ResourceVersion:"1409", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b", Pod:"csi-node-driver-2hqf7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0ef1562ce7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.532 [INFO][3328] k8s.go 578: Cleaning up netns ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.532 [INFO][3328] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" iface="eth0" netns="" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.532 [INFO][3328] k8s.go 585: Releasing IP address(es) ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.532 [INFO][3328] utils.go 188: Calico CNI releasing IP address ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.550 [INFO][3334] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.550 [INFO][3334] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.550 [INFO][3334] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.560 [WARNING][3334] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.561 [INFO][3334] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.562 [INFO][3334] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:55.564386 env[1357]: 2024-02-09 10:00:55.563 [INFO][3328] k8s.go 591: Teardown processing complete. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.564833 env[1357]: time="2024-02-09T10:00:55.564464882Z" level=info msg="TearDown network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" successfully" Feb 9 10:00:55.564833 env[1357]: time="2024-02-09T10:00:55.564501962Z" level=info msg="StopPodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" returns successfully" Feb 9 10:00:55.565440 env[1357]: time="2024-02-09T10:00:55.565409561Z" level=info msg="RemovePodSandbox for \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 10:00:55.565538 env[1357]: time="2024-02-09T10:00:55.565446080Z" level=info msg="Forcibly stopping sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\"" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.611 [WARNING][3352] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--2hqf7-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"ef5dfc8d-5aa1-4a0d-beff-9b3f8249cb46", ResourceVersion:"1409", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 58, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"0e0ad5d4fdf9e53de393288c3a9f3c9d26518478fac7bd6ae4b548fea1d10f9b", Pod:"csi-node-driver-2hqf7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali0ef1562ce7e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.611 [INFO][3352] k8s.go 578: Cleaning up netns ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.611 [INFO][3352] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" iface="eth0" netns="" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.611 [INFO][3352] k8s.go 585: Releasing IP address(es) ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.611 [INFO][3352] utils.go 188: Calico CNI releasing IP address ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.629 [INFO][3361] ipam_plugin.go 415: Releasing address using handleID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.629 [INFO][3361] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.629 [INFO][3361] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.645 [WARNING][3361] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.645 [INFO][3361] ipam_plugin.go 443: Releasing address using workloadID ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" HandleID="k8s-pod-network.2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Workload="10.200.20.44-k8s-csi--node--driver--2hqf7-eth0" Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.647 [INFO][3361] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:55.649426 env[1357]: 2024-02-09 10:00:55.648 [INFO][3352] k8s.go 591: Teardown processing complete. ContainerID="2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b" Feb 9 10:00:55.649877 env[1357]: time="2024-02-09T10:00:55.649511349Z" level=info msg="TearDown network for sandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" successfully" Feb 9 10:00:55.659243 env[1357]: time="2024-02-09T10:00:55.659194534Z" level=info msg="RemovePodSandbox \"2b23bb55610905cb7046eb1de46a2018a5efb0e4acbd01eb4256fa7066514a4b\" returns successfully" Feb 9 10:00:55.659735 env[1357]: time="2024-02-09T10:00:55.659704613Z" level=info msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.769 [WARNING][3379] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"ae767df5-2f19-4e2a-a246-b3dfa0a050e3", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 59, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13", Pod:"nginx-deployment-6d5f899847-fz48l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif79c2029d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.770 [INFO][3379] k8s.go 578: Cleaning up netns ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.770 [INFO][3379] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" iface="eth0" netns="" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.770 [INFO][3379] k8s.go 585: Releasing IP address(es) ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.770 [INFO][3379] utils.go 188: Calico CNI releasing IP address ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.788 [INFO][3385] ipam_plugin.go 415: Releasing address using handleID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.788 [INFO][3385] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.788 [INFO][3385] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.843 [WARNING][3385] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.843 [INFO][3385] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.868 [INFO][3385] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:55.870684 env[1357]: 2024-02-09 10:00:55.869 [INFO][3379] k8s.go 591: Teardown processing complete. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.871257 env[1357]: time="2024-02-09T10:00:55.870719683Z" level=info msg="TearDown network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" successfully" Feb 9 10:00:55.871257 env[1357]: time="2024-02-09T10:00:55.870749843Z" level=info msg="StopPodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" returns successfully" Feb 9 10:00:55.871309 env[1357]: time="2024-02-09T10:00:55.871272802Z" level=info msg="RemovePodSandbox for \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" Feb 9 10:00:55.871374 env[1357]: time="2024-02-09T10:00:55.871329362Z" level=info msg="Forcibly stopping sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\"" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.910 [WARNING][3405] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"ae767df5-2f19-4e2a-a246-b3dfa0a050e3", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 9, 59, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6951119519a6ca523b77c9b91b94eab84bb94a75b57669f9fc6d60086cfd4b13", Pod:"nginx-deployment-6d5f899847-fz48l", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calif79c2029d33", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.910 [INFO][3405] k8s.go 578: Cleaning up netns ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.910 [INFO][3405] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" iface="eth0" netns="" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.910 [INFO][3405] k8s.go 585: Releasing IP address(es) ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.910 [INFO][3405] utils.go 188: Calico CNI releasing IP address ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.928 [INFO][3411] ipam_plugin.go 415: Releasing address using handleID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.928 [INFO][3411] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.928 [INFO][3411] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.938 [WARNING][3411] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.938 [INFO][3411] ipam_plugin.go 443: Releasing address using workloadID ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" HandleID="k8s-pod-network.df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--fz48l-eth0" Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.939 [INFO][3411] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:00:55.942210 env[1357]: 2024-02-09 10:00:55.940 [INFO][3405] k8s.go 591: Teardown processing complete. ContainerID="df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861" Feb 9 10:00:55.943613 env[1357]: time="2024-02-09T10:00:55.942186331Z" level=info msg="TearDown network for sandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" successfully" Feb 9 10:00:55.952242 env[1357]: time="2024-02-09T10:00:55.952193476Z" level=info msg="RemovePodSandbox \"df7845773977930fcd27ebc4954549b3d31a5739c0c9e3502e6f483e53b0a861\" returns successfully" Feb 9 10:00:56.415401 kubelet[1889]: E0209 10:00:56.415337 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:57.416375 kubelet[1889]: E0209 10:00:57.416337 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:58.292815 kubelet[1889]: I0209 10:00:58.292765 1889 topology_manager.go:215] "Topology Admit Handler" podUID="28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded" podNamespace="default" podName="test-pod-1" Feb 9 10:00:58.297127 systemd[1]: Created slice kubepods-besteffort-pod28a6f2a8_9f93_4b57_9b7e_d7e0dbd1fded.slice. Feb 9 10:00:58.387255 kubelet[1889]: I0209 10:00:58.387219 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m2lt8\" (UniqueName: \"kubernetes.io/projected/28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded-kube-api-access-m2lt8\") pod \"test-pod-1\" (UID: \"28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded\") " pod="default/test-pod-1" Feb 9 10:00:58.387522 kubelet[1889]: I0209 10:00:58.387506 1889 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-7ace64a8-caba-46ba-8090-ffdbc32fd9ba\" (UniqueName: \"kubernetes.io/nfs/28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded-pvc-7ace64a8-caba-46ba-8090-ffdbc32fd9ba\") pod \"test-pod-1\" (UID: \"28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded\") " pod="default/test-pod-1" Feb 9 10:00:58.416812 kubelet[1889]: E0209 10:00:58.416778 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:58.544871 kernel: Failed to create system directory netfs Feb 9 10:00:58.545022 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 10:00:58.545056 kernel: audit: type=1400 audit(1707472858.531:797): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.545112 kernel: Failed to create system directory netfs Feb 9 10:00:58.531000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.531000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.574003 kernel: audit: type=1400 audit(1707472858.531:797): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.574097 kernel: Failed to create system directory netfs Feb 9 10:00:58.531000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.597567 kernel: audit: type=1400 audit(1707472858.531:797): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.626011 kernel: Failed to create system directory netfs Feb 9 10:00:58.626140 kernel: audit: type=1400 audit(1707472858.531:797): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.531000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.531000 audit[3421]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1b835e0 a1=12c14 a2=aaaae8e3e028 a3=aaaaf1b74010 items=0 ppid=1237 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:58.686523 kernel: audit: type=1300 audit(1707472858.531:797): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1b835e0 a1=12c14 a2=aaaae8e3e028 a3=aaaaf1b74010 items=0 ppid=1237 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:58.686655 kernel: audit: type=1327 audit(1707472858.531:797): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:00:58.531000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.732463 kernel: Failed to create system directory fscache Feb 9 10:00:58.732556 kernel: audit: type=1400 audit(1707472858.656:798): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.732586 kernel: Failed to create system directory fscache Feb 9 10:00:58.732609 kernel: audit: type=1400 audit(1707472858.656:798): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.760566 kernel: Failed to create system directory fscache Feb 9 10:00:58.760661 kernel: audit: type=1400 audit(1707472858.656:798): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.784121 kernel: Failed to create system directory fscache Feb 9 10:00:58.784215 kernel: audit: type=1400 audit(1707472858.656:798): avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.818389 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.824819 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.830635 kernel: Failed to create system directory fscache Feb 9 10:00:58.830780 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.841052 kernel: Failed to create system directory fscache Feb 9 10:00:58.841163 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.851345 kernel: Failed to create system directory fscache Feb 9 10:00:58.851436 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.856349 kernel: Failed to create system directory fscache Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.656000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.867107 kernel: Failed to create system directory fscache Feb 9 10:00:58.870872 kernel: FS-Cache: Loaded Feb 9 10:00:58.656000 audit[3421]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1d96210 a1=4c344 a2=aaaae8e3e028 a3=aaaaf1b74010 items=0 ppid=1237 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:58.656000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.906963 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.907037 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.907057 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.917274 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.917328 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.927769 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.927808 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.937688 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.937756 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.947524 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.947578 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.957449 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.957518 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.967345 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.967441 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.977024 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.977098 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.987206 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.987267 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.996995 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.997087 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.007117 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.007177 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.016614 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.016672 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.026257 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.031119 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.031257 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.040841 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.040871 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.050456 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.050514 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.059828 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.059929 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.068941 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.069009 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.077961 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.078033 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.086644 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.086725 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.095997 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.096115 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.105128 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.105199 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.114922 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.114993 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.124043 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.124125 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.132942 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.133029 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.141994 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.151176 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.151230 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.151258 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.160325 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.160386 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.169319 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.169391 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.178593 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.178653 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.187788 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.187830 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.196835 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.201756 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.201844 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.207087 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.216296 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.216355 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.225302 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.225366 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.234216 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.234289 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.243352 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.243472 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.252787 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.257904 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.258000 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.267145 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.267223 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.276005 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.276120 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.285360 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.285415 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.289811 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.299193 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.299259 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.309018 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.309111 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.318218 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.318277 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.327096 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.327189 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.336332 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.336396 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.345090 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.345148 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.355369 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.356779 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.365012 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.373897 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.381305 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.384513 systemd[1]: run-containerd-runc-k8s.io-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2-runc.mOfETa.mount: Deactivated successfully. Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.391650 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.396781 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.401507 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.406414 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.411729 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.416947 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.417059 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.421743 kubelet[1889]: E0209 10:00:59.421710 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.426651 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.426745 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.436007 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.436148 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.445228 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.445343 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.453836 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.453922 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.463558 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.468515 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.468645 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.482248 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.482354 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.487827 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.492657 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.497280 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.502174 kernel: Failed to create system directory sunrpc Feb 9 10:00:59.502293 kernel: Failed to create system directory sunrpc Feb 9 10:00:58.890000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.520823 kernel: RPC: Registered named UNIX socket transport module. Feb 9 10:00:59.520959 kernel: RPC: Registered udp transport module. Feb 9 10:00:59.520987 kernel: RPC: Registered tcp transport module. Feb 9 10:00:59.530735 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 10:00:58.890000 audit[3421]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1de2560 a1=fbb6c a2=aaaae8e3e028 a3=aaaaf1b74010 items=6 ppid=1237 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:58.890000 audit: CWD cwd="/" Feb 9 10:00:58.890000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PATH item=1 name=(null) inode=22581 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PATH item=2 name=(null) inode=22581 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PATH item=3 name=(null) inode=22582 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PATH item=4 name=(null) inode=22581 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PATH item=5 name=(null) inode=22583 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:00:58.890000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.574054 kernel: Failed to create system directory nfs Feb 9 10:00:59.574212 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.578711 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.585640 kernel: Failed to create system directory nfs Feb 9 10:00:59.585721 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.593996 kernel: Failed to create system directory nfs Feb 9 10:00:59.594117 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.603850 kernel: Failed to create system directory nfs Feb 9 10:00:59.603973 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.608733 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.613533 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.618255 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.626782 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.631690 kernel: Failed to create system directory nfs Feb 9 10:00:59.631804 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.636053 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.644694 kernel: Failed to create system directory nfs Feb 9 10:00:59.644825 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.653161 kernel: Failed to create system directory nfs Feb 9 10:00:59.653265 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.662718 kernel: Failed to create system directory nfs Feb 9 10:00:59.662786 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.667122 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.671603 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.676044 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.685345 kernel: Failed to create system directory nfs Feb 9 10:00:59.685413 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.694190 kernel: Failed to create system directory nfs Feb 9 10:00:59.694269 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.702929 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.707492 kernel: Failed to create system directory nfs Feb 9 10:00:59.707554 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.716340 kernel: Failed to create system directory nfs Feb 9 10:00:59.716399 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.724981 kernel: Failed to create system directory nfs Feb 9 10:00:59.725052 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.733302 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.737870 kernel: Failed to create system directory nfs Feb 9 10:00:59.737933 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.746522 kernel: Failed to create system directory nfs Feb 9 10:00:59.746553 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.750782 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.755093 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.764333 kernel: Failed to create system directory nfs Feb 9 10:00:59.764404 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.768708 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.773290 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.782093 kernel: Failed to create system directory nfs Feb 9 10:00:59.782163 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.791446 kernel: Failed to create system directory nfs Feb 9 10:00:59.791519 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.800165 kernel: Failed to create system directory nfs Feb 9 10:00:59.800242 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.809151 kernel: Failed to create system directory nfs Feb 9 10:00:59.809209 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.817530 kernel: Failed to create system directory nfs Feb 9 10:00:59.817596 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.821873 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.560000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.830850 kernel: Failed to create system directory nfs Feb 9 10:00:59.560000 audit[3421]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf1f0eb40 a1=ae35c a2=aaaae8e3e028 a3=aaaaf1b74010 items=0 ppid=1237 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:59.846313 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 10:00:59.560000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.884865 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.884944 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.889730 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.894486 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.899667 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.904588 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.909190 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.913872 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.918603 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.923228 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.927943 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.932658 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.937143 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.941934 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.946633 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.951387 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.956531 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.961515 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.966369 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.970785 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.975433 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.980520 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.985073 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.989555 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.994086 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.998630 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.003178 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.007733 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.013880 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.018499 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.025154 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.029710 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.034437 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.034504 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.043778 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.043891 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.052908 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.052987 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.062398 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.062492 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.072193 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.072256 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.081217 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.081276 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.090632 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.090721 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.099605 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.104641 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.111485 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.115994 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.120505 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.125224 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.129404 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.133674 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.133737 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.142732 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.142798 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.152477 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.152539 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.161710 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.161770 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.170864 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.175359 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.180318 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.184943 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.185095 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.193624 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.193656 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.203164 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.203224 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.212011 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.212045 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.221237 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.225664 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.225713 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.234932 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.234983 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.243684 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.243744 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.252716 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.252749 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.261903 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.261973 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.271087 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.271134 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.280003 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.280077 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.289165 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.289224 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.298454 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.298535 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.307659 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.307719 kernel: Failed to create system directory nfs4 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:00:59.869000 audit[3447]: AVC avc: denied { confidentiality } for pid=3447 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.316688 kernel: Failed to create system directory nfs4 Feb 9 10:01:00.422386 kubelet[1889]: E0209 10:01:00.422318 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:00.429292 kernel: NFS: Registering the id_resolver key type Feb 9 10:01:00.429399 kernel: Key type id_resolver registered Feb 9 10:01:00.429429 kernel: Key type id_legacy registered Feb 9 10:00:59.869000 audit[3447]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff8302b010 a1=167c04 a2=aaaac61ee028 a3=aaaadb23d010 items=0 ppid=1237 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:00:59.869000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.454460 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.454540 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.454560 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.463772 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.463828 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.473256 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.478309 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.478367 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.483268 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.492530 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.492565 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.504637 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.504724 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.509306 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.513948 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.518527 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.523101 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.532681 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.532718 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.541831 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.541903 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.551116 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.551182 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.560799 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.560863 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.442000 audit[3448]: AVC avc: denied { confidentiality } for pid=3448 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:01:00.570093 kernel: Failed to create system directory rpcgss Feb 9 10:01:00.442000 audit[3448]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa9d93010 a1=3e09c a2=aaaabb56e028 a3=aaaae3915010 items=0 ppid=1237 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:00.442000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 10:01:01.422495 kubelet[1889]: E0209 10:01:01.422454 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:02.423296 kubelet[1889]: E0209 10:01:02.423265 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:02.645662 nfsidmap[3456]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-67daabce87' Feb 9 10:01:02.709719 nfsidmap[3457]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-67daabce87' Feb 9 10:01:02.726000 audit[1441]: AVC avc: denied { watch_reads } for pid=1441 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:01:02.726000 audit[1441]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf5e93b70 a2=10 a3=0 items=0 ppid=1 pid=1441 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:02.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:01:02.726000 audit[1441]: AVC avc: denied { watch_reads } for pid=1441 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:01:02.726000 audit[1441]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaaf5e93b70 a2=10 a3=0 items=0 ppid=1 pid=1441 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:02.726000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:01:02.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:01:02.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:01:02.726000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2736 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:01:02.801365 env[1357]: time="2024-02-09T10:01:02.801314516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded,Namespace:default,Attempt:0,}" Feb 9 10:01:02.941152 systemd-networkd[1484]: cali5ec59c6bf6e: Link UP Feb 9 10:01:02.953391 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:01:02.953522 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 10:01:02.954709 systemd-networkd[1484]: cali5ec59c6bf6e: Gained carrier Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.875 [INFO][3459] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-test--pod--1-eth0 default 28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded 1446 0 2024-02-09 10:00:08 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.875 [INFO][3459] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.899 [INFO][3470] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" HandleID="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Workload="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.915 [INFO][3470] ipam_plugin.go 268: Auto assigning IP ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" HandleID="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Workload="10.200.20.44-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027da00), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"test-pod-1", "timestamp":"2024-02-09 10:01:02.899089243 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.915 [INFO][3470] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.915 [INFO][3470] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.915 [INFO][3470] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.917 [INFO][3470] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.920 [INFO][3470] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.923 [INFO][3470] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.925 [INFO][3470] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.927 [INFO][3470] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.927 [INFO][3470] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.928 [INFO][3470] ipam.go 1682: Creating new handle: k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.931 [INFO][3470] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.935 [INFO][3470] ipam.go 1216: Successfully claimed IPs: [192.168.8.132/26] block=192.168.8.128/26 handle="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.935 [INFO][3470] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.132/26] handle="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" host="10.200.20.44" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.935 [INFO][3470] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.935 [INFO][3470] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.132/26] IPv6=[] ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" HandleID="k8s-pod-network.5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Workload="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.937 [INFO][3459] k8s.go 385: Populated endpoint ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded", ResourceVersion:"1446", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:01:02.964259 env[1357]: 2024-02-09 10:01:02.937 [INFO][3459] k8s.go 386: Calico CNI using IPs: [192.168.8.132/32] ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.965294 env[1357]: 2024-02-09 10:01:02.937 [INFO][3459] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.965294 env[1357]: 2024-02-09 10:01:02.955 [INFO][3459] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.965294 env[1357]: 2024-02-09 10:01:02.956 [INFO][3459] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded", ResourceVersion:"1446", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 0, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"ce:73:66:92:db:55", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:01:02.965294 env[1357]: 2024-02-09 10:01:02.961 [INFO][3459] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 10:01:02.974000 audit[3489]: NETFILTER_CFG table=filter:82 family=2 entries=38 op=nft_register_chain pid=3489 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:01:02.974000 audit[3489]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19080 a0=3 a1=ffffea293ba0 a2=0 a3=ffff8976afa8 items=0 ppid=2542 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:02.974000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:01:02.983601 env[1357]: time="2024-02-09T10:01:02.983506240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:01:02.983748 env[1357]: time="2024-02-09T10:01:02.983607924Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:01:02.983748 env[1357]: time="2024-02-09T10:01:02.983635724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:01:02.983880 env[1357]: time="2024-02-09T10:01:02.983838491Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d pid=3499 runtime=io.containerd.runc.v2 Feb 9 10:01:02.998639 systemd[1]: Started cri-containerd-5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d.scope. Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.012000 audit: BPF prog-id=114 op=LOAD Feb 9 10:01:03.013000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.013000 audit[3510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:03.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353866396434663839383632316666306331363234613231383834 Feb 9 10:01:03.013000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.013000 audit[3510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:03.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353866396434663839383632316666306331363234613231383834 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit: BPF prog-id=115 op=LOAD Feb 9 10:01:03.014000 audit[3510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:03.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353866396434663839383632316666306331363234613231383834 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.014000 audit: BPF prog-id=116 op=LOAD Feb 9 10:01:03.014000 audit[3510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:03.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353866396434663839383632316666306331363234613231383834 Feb 9 10:01:03.015000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:01:03.015000 audit: BPF prog-id=115 op=UNLOAD Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { perfmon } for pid=3510 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit[3510]: AVC avc: denied { bpf } for pid=3510 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:03.015000 audit: BPF prog-id=117 op=LOAD Feb 9 10:01:03.015000 audit[3510]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3499 pid=3510 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:03.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539353866396434663839383632316666306331363234613231383834 Feb 9 10:01:03.036574 env[1357]: time="2024-02-09T10:01:03.036515347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:28a6f2a8-9f93-4b57-9b7e-d7e0dbd1fded,Namespace:default,Attempt:0,} returns sandbox id \"5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d\"" Feb 9 10:01:03.038946 env[1357]: time="2024-02-09T10:01:03.038880252Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 10:01:03.424480 kubelet[1889]: E0209 10:01:03.424438 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:04.425328 kubelet[1889]: E0209 10:01:04.425289 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:04.713797 env[1357]: time="2024-02-09T10:01:04.713686248Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:01:04.725997 env[1357]: time="2024-02-09T10:01:04.725946012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:01:04.730838 env[1357]: time="2024-02-09T10:01:04.730800839Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:01:04.737358 env[1357]: time="2024-02-09T10:01:04.737321183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:01:04.738037 env[1357]: time="2024-02-09T10:01:04.738005155Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 10:01:04.740440 env[1357]: time="2024-02-09T10:01:04.740407100Z" level=info msg="CreateContainer within sandbox \"5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 10:01:04.761917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount477638800.mount: Deactivated successfully. Feb 9 10:01:04.768057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2308121251.mount: Deactivated successfully. Feb 9 10:01:04.785407 env[1357]: time="2024-02-09T10:01:04.785358531Z" level=info msg="CreateContainer within sandbox \"5958f9d4f898621ff0c1624a21884f3fbcf0fb01f6ef899b46bede2afb1a6f0d\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"455383165ed60638fc909c73aa0c08bd9c7cf519f9201b494f7176cee7102520\"" Feb 9 10:01:04.786353 env[1357]: time="2024-02-09T10:01:04.786324271Z" level=info msg="StartContainer for \"455383165ed60638fc909c73aa0c08bd9c7cf519f9201b494f7176cee7102520\"" Feb 9 10:01:04.804533 systemd[1]: Started cri-containerd-455383165ed60638fc909c73aa0c08bd9c7cf519f9201b494f7176cee7102520.scope. Feb 9 10:01:04.823555 kernel: kauditd_printk_skb: 401 callbacks suppressed Feb 9 10:01:04.823677 kernel: audit: type=1400 audit(1707472864.817:827): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.860843 kernel: audit: type=1400 audit(1707472864.817:828): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.879999 kernel: audit: type=1400 audit(1707472864.817:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.901231 systemd-networkd[1484]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 10:01:04.921720 kernel: audit: type=1400 audit(1707472864.817:830): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.921837 kernel: audit: type=1400 audit(1707472864.817:831): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.941518 kernel: audit: type=1400 audit(1707472864.817:832): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.962122 kernel: audit: type=1400 audit(1707472864.817:833): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.982404 kernel: audit: type=1400 audit(1707472864.817:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.817000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:05.002012 kernel: audit: type=1400 audit(1707472864.817:835): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.822000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:05.024392 kernel: audit: type=1400 audit(1707472864.822:836): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.822000 audit: BPF prog-id=118 op=LOAD Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3499 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:04.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353338333136356564363036333866633930396337336161306330 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3499 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:04.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353338333136356564363036333866633930396337336161306330 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.823000 audit: BPF prog-id=119 op=LOAD Feb 9 10:01:04.823000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3499 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:04.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353338333136356564363036333866633930396337336161306330 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.841000 audit: BPF prog-id=120 op=LOAD Feb 9 10:01:04.841000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3499 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:04.841000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353338333136356564363036333866633930396337336161306330 Feb 9 10:01:04.859000 audit: BPF prog-id=120 op=UNLOAD Feb 9 10:01:04.859000 audit: BPF prog-id=119 op=UNLOAD Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:01:04.859000 audit: BPF prog-id=121 op=LOAD Feb 9 10:01:04.859000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3499 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:01:04.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435353338333136356564363036333866633930396337336161306330 Feb 9 10:01:05.030426 env[1357]: time="2024-02-09T10:01:05.030380251Z" level=info msg="StartContainer for \"455383165ed60638fc909c73aa0c08bd9c7cf519f9201b494f7176cee7102520\" returns successfully" Feb 9 10:01:05.426250 kubelet[1889]: E0209 10:01:05.426202 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:06.426449 kubelet[1889]: E0209 10:01:06.426411 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:07.426606 kubelet[1889]: E0209 10:01:07.426573 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:08.427539 kubelet[1889]: E0209 10:01:08.427499 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:09.428031 kubelet[1889]: E0209 10:01:09.428004 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:10.429239 kubelet[1889]: E0209 10:01:10.429206 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:11.429885 kubelet[1889]: E0209 10:01:11.429853 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:12.430853 kubelet[1889]: E0209 10:01:12.430817 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:13.431246 kubelet[1889]: E0209 10:01:13.431207 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:14.432220 kubelet[1889]: E0209 10:01:14.432163 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:15.317237 kubelet[1889]: E0209 10:01:15.317200 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:15.433275 kubelet[1889]: E0209 10:01:15.433244 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:16.433345 kubelet[1889]: E0209 10:01:16.433316 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:17.434367 kubelet[1889]: E0209 10:01:17.434334 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:18.435423 kubelet[1889]: E0209 10:01:18.435384 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:19.435538 kubelet[1889]: E0209 10:01:19.435501 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:20.436297 kubelet[1889]: E0209 10:01:20.436263 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:21.437124 kubelet[1889]: E0209 10:01:21.437095 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:22.437613 kubelet[1889]: E0209 10:01:22.437576 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:23.438136 kubelet[1889]: E0209 10:01:23.438086 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:24.438386 kubelet[1889]: E0209 10:01:24.438351 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:25.439522 kubelet[1889]: E0209 10:01:25.439486 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:26.440641 kubelet[1889]: E0209 10:01:26.440609 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:27.442087 kubelet[1889]: E0209 10:01:27.442034 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:28.442217 kubelet[1889]: E0209 10:01:28.442184 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:28.585247 kubelet[1889]: E0209 10:01:28.585216 1889 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.4:60944->10.200.20.22:2379: read: connection timed out" Feb 9 10:01:29.367690 systemd[1]: run-containerd-runc-k8s.io-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2-runc.tCcV84.mount: Deactivated successfully. Feb 9 10:01:29.443199 kubelet[1889]: E0209 10:01:29.443156 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:30.443727 kubelet[1889]: E0209 10:01:30.443683 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:31.444547 kubelet[1889]: E0209 10:01:31.444503 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:32.444782 kubelet[1889]: E0209 10:01:32.444729 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:33.445400 kubelet[1889]: E0209 10:01:33.445357 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:34.445672 kubelet[1889]: E0209 10:01:34.445643 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:35.317309 kubelet[1889]: E0209 10:01:35.317278 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:35.447039 kubelet[1889]: E0209 10:01:35.447007 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:36.447527 kubelet[1889]: E0209 10:01:36.447485 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:37.448502 kubelet[1889]: E0209 10:01:37.448456 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:38.449032 kubelet[1889]: E0209 10:01:38.448996 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:38.586627 kubelet[1889]: E0209 10:01:38.586593 1889 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:01:39.450108 kubelet[1889]: E0209 10:01:39.450048 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:40.450384 kubelet[1889]: E0209 10:01:40.450346 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:41.451124 kubelet[1889]: E0209 10:01:41.451093 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:42.452615 kubelet[1889]: E0209 10:01:42.452579 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:43.453167 kubelet[1889]: E0209 10:01:43.453131 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:44.453840 kubelet[1889]: E0209 10:01:44.453809 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:45.455113 kubelet[1889]: E0209 10:01:45.455080 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:46.456399 kubelet[1889]: E0209 10:01:46.456354 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:47.457088 kubelet[1889]: E0209 10:01:47.457039 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:48.458303 kubelet[1889]: E0209 10:01:48.458272 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:48.587235 kubelet[1889]: E0209 10:01:48.587207 1889 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:01:49.459108 kubelet[1889]: E0209 10:01:49.459073 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:50.460191 kubelet[1889]: E0209 10:01:50.460159 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:51.460822 kubelet[1889]: E0209 10:01:51.460786 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:52.461609 kubelet[1889]: E0209 10:01:52.461571 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:53.462218 kubelet[1889]: E0209 10:01:53.462184 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:54.462697 kubelet[1889]: E0209 10:01:54.462661 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:55.317093 kubelet[1889]: E0209 10:01:55.317043 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:55.463611 kubelet[1889]: E0209 10:01:55.463576 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:56.464675 kubelet[1889]: E0209 10:01:56.464644 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:57.465451 kubelet[1889]: E0209 10:01:57.465404 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:58.465677 kubelet[1889]: E0209 10:01:58.465641 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:01:58.588407 kubelet[1889]: E0209 10:01:58.588379 1889 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:01:59.367658 systemd[1]: run-containerd-runc-k8s.io-b2f89b64452629c8231e78e5586db00c128d541131c46ba4215dae5770308fa2-runc.OFDywQ.mount: Deactivated successfully. Feb 9 10:01:59.466372 kubelet[1889]: E0209 10:01:59.466325 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:00.466848 kubelet[1889]: E0209 10:02:00.466805 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:00.488167 kubelet[1889]: E0209 10:02:00.488140 1889 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.44\": Get \"https://10.200.20.4:6443/api/v1/nodes/10.200.20.44?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:02:01.467129 kubelet[1889]: E0209 10:02:01.467091 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:02.467734 kubelet[1889]: E0209 10:02:02.467701 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:03.468606 kubelet[1889]: E0209 10:02:03.468569 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:04.469053 kubelet[1889]: E0209 10:02:04.469020 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:05.469838 kubelet[1889]: E0209 10:02:05.469805 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:06.470849 kubelet[1889]: E0209 10:02:06.470819 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:07.471562 kubelet[1889]: E0209 10:02:07.471520 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:08.472338 kubelet[1889]: E0209 10:02:08.472305 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:08.588961 kubelet[1889]: E0209 10:02:08.588931 1889 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:02:08.589148 kubelet[1889]: I0209 10:02:08.589135 1889 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Feb 9 10:02:09.473149 kubelet[1889]: E0209 10:02:09.473106 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:10.473312 kubelet[1889]: E0209 10:02:10.473265 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:10.488367 kubelet[1889]: E0209 10:02:10.488342 1889 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.44\": Get \"https://10.200.20.4:6443/api/v1/nodes/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:02:11.473418 kubelet[1889]: E0209 10:02:11.473377 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:12.473883 kubelet[1889]: E0209 10:02:12.473846 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:13.474435 kubelet[1889]: E0209 10:02:13.474402 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:14.475308 kubelet[1889]: E0209 10:02:14.475276 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:14.733892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.752090 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.769014 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.787057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.803916 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.821085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.821337 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.851582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.851818 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.851936 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.871618 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.871870 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.892106 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.892267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.911923 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.912169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.932039 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.932260 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.952475 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.952728 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.973023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.973289 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.992910 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:14.993160 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.013187 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.013407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.033937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.034253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.044086 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.065127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.065355 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.086346 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.086536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.106345 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.106547 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.126924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.127143 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.147582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.147849 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.168036 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.168314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.188034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.188244 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.207483 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.207725 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.228057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.228341 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.248247 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.248417 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.268575 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.268796 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.289184 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.289442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.310246 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.310528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.321643 kubelet[1889]: E0209 10:02:15.321605 1889 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:15.332089 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.342711 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.353555 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.364516 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.364663 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.395436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.395628 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.395738 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.415599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.415829 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.436496 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.436727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.457298 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.467710 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.467836 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.478649 kubelet[1889]: E0209 10:02:15.478619 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:15.488606 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.488869 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.508541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.508753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.529038 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.529261 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.549830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.550133 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.569733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.569951 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.602808 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.603215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.603498 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.624015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.624253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.643705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.653701 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.664057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.684924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.685132 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.685241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.706570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.706853 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.717085 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.737696 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.737968 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.771131 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.771392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.771505 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.792733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.792983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.813950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.814215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.840663 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.840935 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.903160 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931299 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931425 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931530 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931638 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931737 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931843 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.931940 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.943229 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.943523 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.965073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.965341 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.982808 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:15.983135 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.002505 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.002770 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.022386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.022660 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.042335 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.042478 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.073364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.073597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.073710 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.093654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.093896 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.113127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.113352 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.132582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.132790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.153089 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.153283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.163090 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.184493 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.184743 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.205117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.205361 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.226234 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.226513 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.246117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.256018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.256233 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.276841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.277125 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.297535 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.297800 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.317731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.317945 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.338159 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.338357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.357757 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.357915 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.378753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.378964 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.389079 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.409055 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.409231 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.442636 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.442895 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.443011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.464105 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.464314 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.479511 kubelet[1889]: E0209 10:02:16.478719 1889 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:02:16.484894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.485163 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.504645 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.504927 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.524997 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.525240 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.545677 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.545889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.565981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.566250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.586030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.596302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.615447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.615657 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.626305 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.636342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.646832 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.666947 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.667204 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.687979 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.688219 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.708573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.708813 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.719158 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.729212 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.739350 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:02:16.739479 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#253 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001