Feb 9 10:27:28.022364 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 10:27:28.022383 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 08:56:26 -00 2024 Feb 9 10:27:28.022391 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 10:27:28.022397 kernel: printk: bootconsole [pl11] enabled Feb 9 10:27:28.022403 kernel: efi: EFI v2.70 by EDK II Feb 9 10:27:28.022408 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 10:27:28.022414 kernel: random: crng init done Feb 9 10:27:28.022420 kernel: ACPI: Early table checksum verification disabled Feb 9 10:27:28.022425 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 10:27:28.022431 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022436 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022443 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 10:27:28.022448 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022454 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022461 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022466 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022472 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022479 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022485 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 10:27:28.022491 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 10:27:28.022497 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 10:27:28.022502 kernel: NUMA: Failed to initialise from firmware Feb 9 10:27:28.022508 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:27:28.022514 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Feb 9 10:27:28.022519 kernel: Zone ranges: Feb 9 10:27:28.022525 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 10:27:28.022531 kernel: DMA32 empty Feb 9 10:27:28.022537 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:27:28.022543 kernel: Movable zone start for each node Feb 9 10:27:28.022549 kernel: Early memory node ranges Feb 9 10:27:28.022554 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 10:27:28.022560 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 10:27:28.022566 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 10:27:28.022571 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 10:27:28.022577 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 10:27:28.022583 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 10:27:28.022588 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 10:27:28.022594 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 10:27:28.022600 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 10:27:28.022607 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 10:27:28.022615 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 10:27:28.022621 kernel: psci: probing for conduit method from ACPI. Feb 9 10:27:28.022627 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 10:27:28.022633 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 10:27:28.022640 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 10:27:28.022646 kernel: psci: SMC Calling Convention v1.4 Feb 9 10:27:28.022652 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 10:27:28.022658 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 10:27:28.022664 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 10:27:28.022670 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 10:27:28.022676 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 10:27:28.022682 kernel: Detected PIPT I-cache on CPU0 Feb 9 10:27:28.022688 kernel: CPU features: detected: GIC system register CPU interface Feb 9 10:27:28.022694 kernel: CPU features: detected: Hardware dirty bit management Feb 9 10:27:28.022700 kernel: CPU features: detected: Spectre-BHB Feb 9 10:27:28.022706 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 10:27:28.022714 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 10:27:28.022721 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 10:27:28.022727 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 10:27:28.022733 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 10:27:28.022739 kernel: Policy zone: Normal Feb 9 10:27:28.022746 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:27:28.022753 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 10:27:28.022760 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 10:27:28.022766 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 10:27:28.022772 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 10:27:28.022779 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 10:27:28.022785 kernel: Memory: 3991928K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202232K reserved, 0K cma-reserved) Feb 9 10:27:28.022792 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 10:27:28.022798 kernel: trace event string verifier disabled Feb 9 10:27:28.022804 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 10:27:28.022810 kernel: rcu: RCU event tracing is enabled. Feb 9 10:27:28.022816 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 10:27:28.022823 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 10:27:28.022829 kernel: Tracing variant of Tasks RCU enabled. Feb 9 10:27:28.022835 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 10:27:28.022841 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 10:27:28.022848 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 10:27:28.022854 kernel: GICv3: 960 SPIs implemented Feb 9 10:27:28.022860 kernel: GICv3: 0 Extended SPIs implemented Feb 9 10:27:28.022866 kernel: GICv3: Distributor has no Range Selector support Feb 9 10:27:28.022872 kernel: Root IRQ handler: gic_handle_irq Feb 9 10:27:28.022878 kernel: GICv3: 16 PPIs implemented Feb 9 10:27:28.022884 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 10:27:28.022891 kernel: ITS: No ITS available, not enabling LPIs Feb 9 10:27:28.022897 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:28.022903 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 10:27:28.022909 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 10:27:28.022916 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 10:27:28.022923 kernel: Console: colour dummy device 80x25 Feb 9 10:27:28.022930 kernel: printk: console [tty1] enabled Feb 9 10:27:28.022936 kernel: ACPI: Core revision 20210730 Feb 9 10:27:28.022943 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 10:27:28.022949 kernel: pid_max: default: 32768 minimum: 301 Feb 9 10:27:28.022955 kernel: LSM: Security Framework initializing Feb 9 10:27:28.022962 kernel: SELinux: Initializing. Feb 9 10:27:28.022968 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:27:28.022974 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 10:27:28.022982 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 10:27:28.022988 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 10:27:28.022995 kernel: rcu: Hierarchical SRCU implementation. Feb 9 10:27:28.023001 kernel: Remapping and enabling EFI services. Feb 9 10:27:28.023007 kernel: smp: Bringing up secondary CPUs ... Feb 9 10:27:28.023013 kernel: Detected PIPT I-cache on CPU1 Feb 9 10:27:28.023019 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 10:27:28.023026 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 10:27:28.023032 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 10:27:28.023040 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 10:27:28.023046 kernel: SMP: Total of 2 processors activated. Feb 9 10:27:28.023052 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 10:27:28.023059 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 10:27:28.023065 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 10:27:28.023071 kernel: CPU features: detected: CRC32 instructions Feb 9 10:27:28.023077 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 10:27:28.023084 kernel: CPU features: detected: LSE atomic instructions Feb 9 10:27:28.023090 kernel: CPU features: detected: Privileged Access Never Feb 9 10:27:28.023097 kernel: CPU: All CPU(s) started at EL1 Feb 9 10:27:28.023103 kernel: alternatives: patching kernel code Feb 9 10:27:28.023114 kernel: devtmpfs: initialized Feb 9 10:27:28.023122 kernel: KASLR enabled Feb 9 10:27:28.023129 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 10:27:28.023136 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 10:27:28.023142 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 10:27:28.023148 kernel: SMBIOS 3.1.0 present. Feb 9 10:27:28.023155 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 10:27:28.023162 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 10:27:28.023184 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 10:27:28.023191 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 10:27:28.023197 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 10:27:28.023204 kernel: audit: initializing netlink subsys (disabled) Feb 9 10:27:28.023210 kernel: audit: type=2000 audit(0.088:1): state=initialized audit_enabled=0 res=1 Feb 9 10:27:28.023217 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 10:27:28.023224 kernel: cpuidle: using governor menu Feb 9 10:27:28.023231 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 10:27:28.023238 kernel: ASID allocator initialised with 32768 entries Feb 9 10:27:28.023245 kernel: ACPI: bus type PCI registered Feb 9 10:27:28.023251 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 10:27:28.023258 kernel: Serial: AMBA PL011 UART driver Feb 9 10:27:28.023264 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 10:27:28.023271 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 10:27:28.023277 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 10:27:28.023284 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 10:27:28.023291 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 10:27:28.023298 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 10:27:28.023305 kernel: ACPI: Added _OSI(Module Device) Feb 9 10:27:28.023311 kernel: ACPI: Added _OSI(Processor Device) Feb 9 10:27:28.023318 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 10:27:28.023324 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 10:27:28.023331 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 10:27:28.023337 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 10:27:28.023344 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 10:27:28.023351 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 10:27:28.023358 kernel: ACPI: Interpreter enabled Feb 9 10:27:28.023364 kernel: ACPI: Using GIC for interrupt routing Feb 9 10:27:28.023371 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 10:27:28.023378 kernel: printk: console [ttyAMA0] enabled Feb 9 10:27:28.023384 kernel: printk: bootconsole [pl11] disabled Feb 9 10:27:28.023391 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 10:27:28.023397 kernel: iommu: Default domain type: Translated Feb 9 10:27:28.023404 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 10:27:28.023412 kernel: vgaarb: loaded Feb 9 10:27:28.023418 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 10:27:28.023425 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 10:27:28.023432 kernel: PTP clock support registered Feb 9 10:27:28.023439 kernel: Registered efivars operations Feb 9 10:27:28.023445 kernel: No ACPI PMU IRQ for CPU0 Feb 9 10:27:28.023451 kernel: No ACPI PMU IRQ for CPU1 Feb 9 10:27:28.023458 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 10:27:28.023464 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 10:27:28.023472 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 10:27:28.023479 kernel: pnp: PnP ACPI init Feb 9 10:27:28.023485 kernel: pnp: PnP ACPI: found 0 devices Feb 9 10:27:28.023492 kernel: NET: Registered PF_INET protocol family Feb 9 10:27:28.023498 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 10:27:28.023505 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 10:27:28.023512 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 10:27:28.023519 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 10:27:28.023525 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 10:27:28.023533 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 10:27:28.023540 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:27:28.023546 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 10:27:28.023553 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 10:27:28.023560 kernel: PCI: CLS 0 bytes, default 64 Feb 9 10:27:28.023566 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 10:27:28.023573 kernel: kvm [1]: HYP mode not available Feb 9 10:27:28.023579 kernel: Initialise system trusted keyrings Feb 9 10:27:28.023586 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 10:27:28.023594 kernel: Key type asymmetric registered Feb 9 10:27:28.023600 kernel: Asymmetric key parser 'x509' registered Feb 9 10:27:28.023607 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 10:27:28.023613 kernel: io scheduler mq-deadline registered Feb 9 10:27:28.023620 kernel: io scheduler kyber registered Feb 9 10:27:28.023626 kernel: io scheduler bfq registered Feb 9 10:27:28.023633 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 10:27:28.023640 kernel: thunder_xcv, ver 1.0 Feb 9 10:27:28.023646 kernel: thunder_bgx, ver 1.0 Feb 9 10:27:28.023654 kernel: nicpf, ver 1.0 Feb 9 10:27:28.023660 kernel: nicvf, ver 1.0 Feb 9 10:27:28.023771 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 10:27:28.023836 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T10:27:27 UTC (1707474447) Feb 9 10:27:28.023845 kernel: efifb: probing for efifb Feb 9 10:27:28.023852 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 10:27:28.023859 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 10:27:28.023865 kernel: efifb: scrolling: redraw Feb 9 10:27:28.023874 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 10:27:28.023880 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:27:28.023887 kernel: fb0: EFI VGA frame buffer device Feb 9 10:27:28.023894 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 10:27:28.023900 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 10:27:28.023907 kernel: NET: Registered PF_INET6 protocol family Feb 9 10:27:28.023914 kernel: Segment Routing with IPv6 Feb 9 10:27:28.023920 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 10:27:28.023927 kernel: NET: Registered PF_PACKET protocol family Feb 9 10:27:28.023935 kernel: Key type dns_resolver registered Feb 9 10:27:28.023941 kernel: registered taskstats version 1 Feb 9 10:27:28.023948 kernel: Loading compiled-in X.509 certificates Feb 9 10:27:28.023955 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: ca91574208414224935c9cea513398977daf917d' Feb 9 10:27:28.023961 kernel: Key type .fscrypt registered Feb 9 10:27:28.023968 kernel: Key type fscrypt-provisioning registered Feb 9 10:27:28.023974 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 10:27:28.023981 kernel: ima: Allocated hash algorithm: sha1 Feb 9 10:27:28.023987 kernel: ima: No architecture policies found Feb 9 10:27:28.023995 kernel: Freeing unused kernel memory: 34688K Feb 9 10:27:28.024001 kernel: Run /init as init process Feb 9 10:27:28.024008 kernel: with arguments: Feb 9 10:27:28.024014 kernel: /init Feb 9 10:27:28.024021 kernel: with environment: Feb 9 10:27:28.024027 kernel: HOME=/ Feb 9 10:27:28.024034 kernel: TERM=linux Feb 9 10:27:28.024040 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 10:27:28.024049 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:27:28.024058 systemd[1]: Detected virtualization microsoft. Feb 9 10:27:28.024066 systemd[1]: Detected architecture arm64. Feb 9 10:27:28.024073 systemd[1]: Running in initrd. Feb 9 10:27:28.024080 systemd[1]: No hostname configured, using default hostname. Feb 9 10:27:28.024086 systemd[1]: Hostname set to . Feb 9 10:27:28.024094 systemd[1]: Initializing machine ID from random generator. Feb 9 10:27:28.024101 systemd[1]: Queued start job for default target initrd.target. Feb 9 10:27:28.024110 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:27:28.024117 systemd[1]: Reached target cryptsetup.target. Feb 9 10:27:28.024124 systemd[1]: Reached target paths.target. Feb 9 10:27:28.024131 systemd[1]: Reached target slices.target. Feb 9 10:27:28.024138 systemd[1]: Reached target swap.target. Feb 9 10:27:28.024145 systemd[1]: Reached target timers.target. Feb 9 10:27:28.024152 systemd[1]: Listening on iscsid.socket. Feb 9 10:27:28.024159 systemd[1]: Listening on iscsiuio.socket. Feb 9 10:27:28.034213 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 10:27:28.034227 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 10:27:28.034235 systemd[1]: Listening on systemd-journald.socket. Feb 9 10:27:28.034243 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:27:28.034250 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:27:28.034258 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:27:28.034265 systemd[1]: Reached target sockets.target. Feb 9 10:27:28.034272 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:27:28.034280 systemd[1]: Finished network-cleanup.service. Feb 9 10:27:28.034293 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 10:27:28.034300 systemd[1]: Starting systemd-journald.service... Feb 9 10:27:28.034307 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:27:28.034315 systemd[1]: Starting systemd-resolved.service... Feb 9 10:27:28.034322 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 10:27:28.034333 systemd-journald[276]: Journal started Feb 9 10:27:28.034393 systemd-journald[276]: Runtime Journal (/run/log/journal/ab53d249854045938e2bb1861a7d95af) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:27:28.018861 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 10:27:28.055077 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 10:27:28.056190 systemd[1]: Started systemd-journald.service. Feb 9 10:27:28.063915 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 10:27:28.072407 kernel: Bridge firewalling registered Feb 9 10:27:28.069414 systemd-resolved[278]: Positive Trust Anchors: Feb 9 10:27:28.108634 kernel: audit: type=1130 audit(1707474448.078:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.108658 kernel: SCSI subsystem initialized Feb 9 10:27:28.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.069422 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:27:28.165442 kernel: audit: type=1130 audit(1707474448.120:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.165467 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 10:27:28.165477 kernel: device-mapper: uevent: version 1.0.3 Feb 9 10:27:28.165485 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 10:27:28.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.069448 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:27:28.219299 kernel: audit: type=1130 audit(1707474448.169:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.071618 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 10:27:28.096670 systemd[1]: Started systemd-resolved.service. Feb 9 10:27:28.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.138816 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:27:28.285801 kernel: audit: type=1130 audit(1707474448.223:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.285835 kernel: audit: type=1130 audit(1707474448.249:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.168136 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 10:27:28.313089 kernel: audit: type=1130 audit(1707474448.261:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.169536 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 10:27:28.224100 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:27:28.250334 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 10:27:28.262194 systemd[1]: Reached target nss-lookup.target. Feb 9 10:27:28.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.308237 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 10:27:28.384493 kernel: audit: type=1130 audit(1707474448.353:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.321787 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:27:28.412218 kernel: audit: type=1130 audit(1707474448.388:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.326667 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 10:27:28.338229 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:27:28.353929 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 10:27:28.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.389379 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 10:27:28.460455 kernel: audit: type=1130 audit(1707474448.423:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.424310 systemd[1]: Starting dracut-cmdline.service... Feb 9 10:27:28.465359 dracut-cmdline[298]: dracut-dracut-053 Feb 9 10:27:28.465359 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=14ffd9340f674a8d04c9d43eed85484d8b2b7e2bcd8b36a975c9ac66063d537d Feb 9 10:27:28.524181 kernel: Loading iSCSI transport class v2.0-870. Feb 9 10:27:28.534196 kernel: iscsi: registered transport (tcp) Feb 9 10:27:28.553390 kernel: iscsi: registered transport (qla4xxx) Feb 9 10:27:28.553446 kernel: QLogic iSCSI HBA Driver Feb 9 10:27:28.582780 systemd[1]: Finished dracut-cmdline.service. Feb 9 10:27:28.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:28.588219 systemd[1]: Starting dracut-pre-udev.service... Feb 9 10:27:28.642190 kernel: raid6: neonx8 gen() 13817 MB/s Feb 9 10:27:28.662179 kernel: raid6: neonx8 xor() 10837 MB/s Feb 9 10:27:28.682178 kernel: raid6: neonx4 gen() 13511 MB/s Feb 9 10:27:28.703196 kernel: raid6: neonx4 xor() 11192 MB/s Feb 9 10:27:28.724177 kernel: raid6: neonx2 gen() 12941 MB/s Feb 9 10:27:28.745182 kernel: raid6: neonx2 xor() 10286 MB/s Feb 9 10:27:28.767176 kernel: raid6: neonx1 gen() 10511 MB/s Feb 9 10:27:28.788174 kernel: raid6: neonx1 xor() 8788 MB/s Feb 9 10:27:28.808179 kernel: raid6: int64x8 gen() 6298 MB/s Feb 9 10:27:28.830175 kernel: raid6: int64x8 xor() 3547 MB/s Feb 9 10:27:28.851173 kernel: raid6: int64x4 gen() 7240 MB/s Feb 9 10:27:28.872179 kernel: raid6: int64x4 xor() 3858 MB/s Feb 9 10:27:28.894174 kernel: raid6: int64x2 gen() 6153 MB/s Feb 9 10:27:28.915175 kernel: raid6: int64x2 xor() 3322 MB/s Feb 9 10:27:28.936174 kernel: raid6: int64x1 gen() 5040 MB/s Feb 9 10:27:28.962107 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 10:27:28.962127 kernel: raid6: using algorithm neonx8 gen() 13817 MB/s Feb 9 10:27:28.962143 kernel: raid6: .... xor() 10837 MB/s, rmw enabled Feb 9 10:27:28.966578 kernel: raid6: using neon recovery algorithm Feb 9 10:27:28.984176 kernel: xor: measuring software checksum speed Feb 9 10:27:28.993115 kernel: 8regs : 17308 MB/sec Feb 9 10:27:28.993125 kernel: 32regs : 20755 MB/sec Feb 9 10:27:29.002176 kernel: arm64_neon : 27741 MB/sec Feb 9 10:27:29.002186 kernel: xor: using function: arm64_neon (27741 MB/sec) Feb 9 10:27:29.058183 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 10:27:29.066724 systemd[1]: Finished dracut-pre-udev.service. Feb 9 10:27:29.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:29.075000 audit: BPF prog-id=7 op=LOAD Feb 9 10:27:29.076000 audit: BPF prog-id=8 op=LOAD Feb 9 10:27:29.076649 systemd[1]: Starting systemd-udevd.service... Feb 9 10:27:29.094478 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 9 10:27:29.100240 systemd[1]: Started systemd-udevd.service. Feb 9 10:27:29.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:29.111615 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 10:27:29.127784 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Feb 9 10:27:29.157454 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 10:27:29.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:29.162805 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:27:29.200052 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:27:29.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:29.249199 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 10:27:29.275186 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 10:27:29.275242 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 10:27:29.275252 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 10:27:29.276190 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 10:27:29.285182 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 10:27:29.297225 kernel: scsi host0: storvsc_host_t Feb 9 10:27:29.297292 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 10:27:29.311327 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 10:27:29.311398 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 10:27:29.330436 kernel: scsi host1: storvsc_host_t Feb 9 10:27:29.330633 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 10:27:29.350657 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 10:27:29.350861 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 10:27:29.352192 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 10:27:29.370196 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 10:27:29.370398 kernel: hv_netvsc 0022487b-ccd2-0022-487b-ccd20022487b eth0: VF slot 1 added Feb 9 10:27:29.374807 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 10:27:29.381106 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 10:27:29.383197 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 10:27:29.394183 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 10:27:29.402181 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:27:29.407183 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 10:27:29.415180 kernel: hv_vmbus: registering driver hv_pci Feb 9 10:27:29.423181 kernel: hv_pci ca7f6ca0-c331-4c59-858f-67ba2efb91ea: PCI VMBus probing: Using version 0x10004 Feb 9 10:27:29.440291 kernel: hv_pci ca7f6ca0-c331-4c59-858f-67ba2efb91ea: PCI host bridge to bus c331:00 Feb 9 10:27:29.440470 kernel: pci_bus c331:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 10:27:29.448536 kernel: pci_bus c331:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 10:27:29.457201 kernel: pci c331:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 10:27:29.468340 kernel: pci c331:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:27:29.491227 kernel: pci c331:00:02.0: enabling Extended Tags Feb 9 10:27:29.510179 kernel: pci c331:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at c331:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 10:27:29.510342 kernel: pci_bus c331:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 10:27:29.524012 kernel: pci c331:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 10:27:29.565186 kernel: mlx5_core c331:00:02.0: firmware version: 16.30.1284 Feb 9 10:27:29.725249 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 10:27:29.736538 kernel: mlx5_core c331:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 10:27:29.808651 kernel: hv_netvsc 0022487b-ccd2-0022-487b-ccd20022487b eth0: VF registering: eth1 Feb 9 10:27:29.808834 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (526) Feb 9 10:27:29.808850 kernel: mlx5_core c331:00:02.0 eth1: joined to eth0 Feb 9 10:27:29.821183 kernel: mlx5_core c331:00:02.0 enP49969s1: renamed from eth1 Feb 9 10:27:29.826588 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:27:29.884417 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 10:27:29.944289 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 10:27:29.950602 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 10:27:29.964399 systemd[1]: Starting disk-uuid.service... Feb 9 10:27:29.990443 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:27:30.000215 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:27:31.010571 disk-uuid[604]: The operation has completed successfully. Feb 9 10:27:31.017364 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 10:27:31.073359 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 10:27:31.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.073447 systemd[1]: Finished disk-uuid.service. Feb 9 10:27:31.079021 systemd[1]: Starting verity-setup.service... Feb 9 10:27:31.122191 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 10:27:31.401953 systemd[1]: Found device dev-mapper-usr.device. Feb 9 10:27:31.413434 systemd[1]: Mounting sysusr-usr.mount... Feb 9 10:27:31.417514 systemd[1]: Finished verity-setup.service. Feb 9 10:27:31.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.481185 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 10:27:31.481263 systemd[1]: Mounted sysusr-usr.mount. Feb 9 10:27:31.485770 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 10:27:31.486544 systemd[1]: Starting ignition-setup.service... Feb 9 10:27:31.494498 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 10:27:31.536901 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:27:31.536955 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:27:31.541659 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:27:31.591543 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 10:27:31.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.601000 audit: BPF prog-id=9 op=LOAD Feb 9 10:27:31.602152 systemd[1]: Starting systemd-networkd.service... Feb 9 10:27:31.626026 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 10:27:31.627602 systemd-networkd[845]: lo: Link UP Feb 9 10:27:31.636000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.627605 systemd-networkd[845]: lo: Gained carrier Feb 9 10:27:31.627969 systemd-networkd[845]: Enumeration completed Feb 9 10:27:31.631605 systemd[1]: Started systemd-networkd.service. Feb 9 10:27:31.631804 systemd-networkd[845]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:27:31.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.637063 systemd[1]: Reached target network.target. Feb 9 10:27:31.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.685558 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:27:31.685558 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 10:27:31.685558 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 10:27:31.685558 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 10:27:31.685558 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 10:27:31.685558 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 10:27:31.685558 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 10:27:31.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.645908 systemd[1]: Starting iscsiuio.service... Feb 9 10:27:31.657440 systemd[1]: Started iscsiuio.service. Feb 9 10:27:31.666558 systemd[1]: Starting iscsid.service... Feb 9 10:27:31.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.677197 systemd[1]: Started iscsid.service. Feb 9 10:27:31.682354 systemd[1]: Starting dracut-initqueue.service... Feb 9 10:27:31.734507 systemd[1]: Finished dracut-initqueue.service. Feb 9 10:27:31.745008 systemd[1]: Reached target remote-fs-pre.target. Feb 9 10:27:31.757357 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:27:31.762569 systemd[1]: Reached target remote-fs.target. Feb 9 10:27:31.776215 systemd[1]: Starting dracut-pre-mount.service... Feb 9 10:27:31.842339 kernel: mlx5_core c331:00:02.0 enP49969s1: Link up Feb 9 10:27:31.798484 systemd[1]: Finished dracut-pre-mount.service. Feb 9 10:27:31.862481 systemd[1]: Finished ignition-setup.service. Feb 9 10:27:31.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:31.868484 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 10:27:31.892177 kernel: hv_netvsc 0022487b-ccd2-0022-487b-ccd20022487b eth0: Data path switched to VF: enP49969s1 Feb 9 10:27:31.898834 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:27:31.897929 systemd-networkd[845]: enP49969s1: Link UP Feb 9 10:27:31.898133 systemd-networkd[845]: eth0: Link UP Feb 9 10:27:31.898706 systemd-networkd[845]: eth0: Gained carrier Feb 9 10:27:31.906259 systemd-networkd[845]: enP49969s1: Gained carrier Feb 9 10:27:31.924224 systemd-networkd[845]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:27:33.207279 systemd-networkd[845]: eth0: Gained IPv6LL Feb 9 10:27:34.759795 ignition[869]: Ignition 2.14.0 Feb 9 10:27:34.759808 ignition[869]: Stage: fetch-offline Feb 9 10:27:34.759864 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:34.759887 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:34.830966 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:34.831135 ignition[869]: parsed url from cmdline: "" Feb 9 10:27:34.831139 ignition[869]: no config URL provided Feb 9 10:27:34.831144 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:27:34.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.846964 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 10:27:34.896338 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 10:27:34.896364 kernel: audit: type=1130 audit(1707474454.856:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:34.831153 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:27:34.869142 systemd[1]: Starting ignition-fetch.service... Feb 9 10:27:34.831158 ignition[869]: failed to fetch config: resource requires networking Feb 9 10:27:34.831487 ignition[869]: Ignition finished successfully Feb 9 10:27:34.881694 ignition[875]: Ignition 2.14.0 Feb 9 10:27:34.881701 ignition[875]: Stage: fetch Feb 9 10:27:34.881816 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:34.881841 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:34.886177 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:34.886390 ignition[875]: parsed url from cmdline: "" Feb 9 10:27:34.886404 ignition[875]: no config URL provided Feb 9 10:27:34.886414 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 10:27:34.886423 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 9 10:27:34.886482 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 10:27:34.984657 ignition[875]: GET result: OK Feb 9 10:27:34.984703 ignition[875]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 10:27:35.048291 ignition[875]: opening config device: "/dev/sr0" Feb 9 10:27:35.048752 ignition[875]: getting drive status for "/dev/sr0" Feb 9 10:27:35.048829 ignition[875]: drive status: OK Feb 9 10:27:35.052475 ignition[875]: mounting config device Feb 9 10:27:35.052488 ignition[875]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure236410126" Feb 9 10:27:35.080301 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 10:27:35.081243 ignition[875]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure236410126" Feb 9 10:27:35.081255 ignition[875]: checking for config drive Feb 9 10:27:35.089398 ignition[875]: reading config Feb 9 10:27:35.089775 ignition[875]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure236410126" Feb 9 10:27:35.097668 ignition[875]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure236410126" Feb 9 10:27:35.090137 systemd[1]: tmp-ignition\x2dazure236410126.mount: Deactivated successfully. Feb 9 10:27:35.097687 ignition[875]: config has been read from custom data Feb 9 10:27:35.097725 ignition[875]: parsing config with SHA512: 9c72a3223d515a0ea7b3b37c9c453bb9307b09d48510c91d9a0dbf4e65653820f61423f7977955eb0f74ea987163c4fad1470e59469db51756286fdcc9070c79 Feb 9 10:27:35.126021 unknown[875]: fetched base config from "system" Feb 9 10:27:35.126059 unknown[875]: fetched base config from "system" Feb 9 10:27:35.126727 ignition[875]: fetch: fetch complete Feb 9 10:27:35.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.126070 unknown[875]: fetched user config from "azure" Feb 9 10:27:35.176063 kernel: audit: type=1130 audit(1707474455.142:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.126733 ignition[875]: fetch: fetch passed Feb 9 10:27:35.137033 systemd[1]: Finished ignition-fetch.service. Feb 9 10:27:35.126793 ignition[875]: Ignition finished successfully Feb 9 10:27:35.223655 kernel: audit: type=1130 audit(1707474455.192:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.165890 systemd[1]: Starting ignition-kargs.service... Feb 9 10:27:35.268315 kernel: audit: type=1130 audit(1707474455.234:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.177590 ignition[883]: Ignition 2.14.0 Feb 9 10:27:35.186379 systemd[1]: Finished ignition-kargs.service. Feb 9 10:27:35.177597 ignition[883]: Stage: kargs Feb 9 10:27:35.213716 systemd[1]: Starting ignition-disks.service... Feb 9 10:27:35.177699 ignition[883]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:35.229015 systemd[1]: Finished ignition-disks.service. Feb 9 10:27:35.177717 ignition[883]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:35.234699 systemd[1]: Reached target initrd-root-device.target. Feb 9 10:27:35.180349 ignition[883]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:35.269256 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:27:35.183641 ignition[883]: kargs: kargs passed Feb 9 10:27:35.278259 systemd[1]: Reached target local-fs.target. Feb 9 10:27:35.183686 ignition[883]: Ignition finished successfully Feb 9 10:27:35.287231 systemd[1]: Reached target sysinit.target. Feb 9 10:27:35.220329 ignition[889]: Ignition 2.14.0 Feb 9 10:27:35.294748 systemd[1]: Reached target basic.target. Feb 9 10:27:35.220335 ignition[889]: Stage: disks Feb 9 10:27:35.310208 systemd[1]: Starting systemd-fsck-root.service... Feb 9 10:27:35.220437 ignition[889]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:35.220458 ignition[889]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:35.223087 ignition[889]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:35.225244 ignition[889]: disks: disks passed Feb 9 10:27:35.225299 ignition[889]: Ignition finished successfully Feb 9 10:27:35.401801 systemd-fsck[897]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 10:27:35.411557 systemd[1]: Finished systemd-fsck-root.service. Feb 9 10:27:35.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.441449 systemd[1]: Mounting sysroot.mount... Feb 9 10:27:35.451131 kernel: audit: type=1130 audit(1707474455.420:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:35.463200 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 10:27:35.463712 systemd[1]: Mounted sysroot.mount. Feb 9 10:27:35.467467 systemd[1]: Reached target initrd-root-fs.target. Feb 9 10:27:35.498576 systemd[1]: Mounting sysroot-usr.mount... Feb 9 10:27:35.503508 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 10:27:35.511535 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 10:27:35.511570 systemd[1]: Reached target ignition-diskful.target. Feb 9 10:27:35.517438 systemd[1]: Mounted sysroot-usr.mount. Feb 9 10:27:35.558996 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:27:35.564408 systemd[1]: Starting initrd-setup-root.service... Feb 9 10:27:35.589088 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 10:27:35.596248 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Feb 9 10:27:35.608649 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:27:35.608692 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:27:35.613309 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:27:35.617401 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:27:35.636892 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Feb 9 10:27:35.646379 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 10:27:35.656611 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 10:27:36.054526 systemd[1]: Finished initrd-setup-root.service. Feb 9 10:27:36.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.079197 systemd[1]: Starting ignition-mount.service... Feb 9 10:27:36.091021 kernel: audit: type=1130 audit(1707474456.059:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.089037 systemd[1]: Starting sysroot-boot.service... Feb 9 10:27:36.095926 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 10:27:36.096039 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 10:27:36.115428 ignition[972]: INFO : Ignition 2.14.0 Feb 9 10:27:36.115428 ignition[972]: INFO : Stage: mount Feb 9 10:27:36.125602 ignition[972]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:36.125602 ignition[972]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:36.125602 ignition[972]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:36.125602 ignition[972]: INFO : mount: mount passed Feb 9 10:27:36.125602 ignition[972]: INFO : Ignition finished successfully Feb 9 10:27:36.216549 kernel: audit: type=1130 audit(1707474456.138:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.216574 kernel: audit: type=1130 audit(1707474456.190:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.125747 systemd[1]: Finished ignition-mount.service. Feb 9 10:27:36.177374 systemd[1]: Finished sysroot-boot.service. Feb 9 10:27:36.862421 coreos-metadata[906]: Feb 09 10:27:36.862 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 10:27:36.870884 coreos-metadata[906]: Feb 09 10:27:36.864 INFO Fetch successful Feb 9 10:27:36.901739 coreos-metadata[906]: Feb 09 10:27:36.901 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 10:27:36.923551 coreos-metadata[906]: Feb 09 10:27:36.923 INFO Fetch successful Feb 9 10:27:36.937775 coreos-metadata[906]: Feb 09 10:27:36.937 INFO wrote hostname ci-3510.3.2-a-f964c266ce to /sysroot/etc/hostname Feb 9 10:27:36.939851 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 10:27:36.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.976623 systemd[1]: Starting ignition-files.service... Feb 9 10:27:36.986039 kernel: audit: type=1130 audit(1707474456.952:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:36.989231 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 10:27:37.010204 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (985) Feb 9 10:27:37.010239 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 10:27:37.021649 kernel: BTRFS info (device sda6): using free space tree Feb 9 10:27:37.021670 kernel: BTRFS info (device sda6): has skinny extents Feb 9 10:27:37.033315 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 10:27:37.048077 ignition[1004]: INFO : Ignition 2.14.0 Feb 9 10:27:37.048077 ignition[1004]: INFO : Stage: files Feb 9 10:27:37.060456 ignition[1004]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:37.060456 ignition[1004]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:37.060456 ignition[1004]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:37.060456 ignition[1004]: DEBUG : files: compiled without relabeling support, skipping Feb 9 10:27:37.105062 ignition[1004]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 10:27:37.105062 ignition[1004]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 10:27:37.191866 ignition[1004]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 10:27:37.200986 ignition[1004]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 10:27:37.212517 unknown[1004]: wrote ssh authorized keys file for user: core Feb 9 10:27:37.219321 ignition[1004]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 10:27:37.229501 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:27:37.229501 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 10:27:37.718421 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 10:27:37.931049 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 10:27:37.947725 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 10:27:37.947725 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:27:37.947725 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 10:27:38.327885 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 10:27:38.457346 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 10:27:38.474922 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 10:27:38.474922 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:27:38.474922 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 10:27:38.871717 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 10:27:39.181512 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 10:27:39.197692 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 10:27:39.197692 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:27:39.197692 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 10:27:39.255186 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 10:27:39.997919 ignition[1004]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:27:40.016570 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:27:40.152384 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1008) Feb 9 10:27:40.152410 kernel: audit: type=1130 audit(1707474460.107:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem519244198" Feb 9 10:27:40.152463 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem519244198": device or resource busy Feb 9 10:27:40.152463 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem519244198", trying btrfs: device or resource busy Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem519244198" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem519244198" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem519244198" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem519244198" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2265158130" Feb 9 10:27:40.152463 ignition[1004]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2265158130": device or resource busy Feb 9 10:27:40.152463 ignition[1004]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2265158130", trying btrfs: device or resource busy Feb 9 10:27:40.152463 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2265158130" Feb 9 10:27:40.414493 kernel: audit: type=1130 audit(1707474460.170:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.414524 kernel: audit: type=1131 audit(1707474460.170:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.414534 kernel: audit: type=1130 audit(1707474460.269:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.414544 kernel: audit: type=1130 audit(1707474460.388:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.067060 systemd[1]: mnt-oem519244198.mount: Deactivated successfully. Feb 9 10:27:40.422176 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2265158130" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2265158130" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2265158130" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 10:27:40.422176 ignition[1004]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 10:27:40.745284 kernel: audit: type=1131 audit(1707474460.416:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.745340 kernel: audit: type=1130 audit(1707474460.521:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.745363 kernel: audit: type=1131 audit(1707474460.616:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.094296 systemd[1]: mnt-oem2265158130.mount: Deactivated successfully. Feb 9 10:27:40.756278 ignition[1004]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 10:27:40.756278 ignition[1004]: INFO : files: files passed Feb 9 10:27:40.756278 ignition[1004]: INFO : Ignition finished successfully Feb 9 10:27:40.900237 kernel: audit: type=1131 audit(1707474460.802:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.900262 kernel: audit: type=1131 audit(1707474460.848:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.880000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.894000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.900394 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 10:27:40.097863 systemd[1]: Finished ignition-files.service. Feb 9 10:27:40.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.135425 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 10:27:40.140563 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 10:27:40.141366 systemd[1]: Starting ignition-quench.service... Feb 9 10:27:40.165821 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 10:27:40.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.165927 systemd[1]: Finished ignition-quench.service. Feb 9 10:27:40.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.254389 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 10:27:40.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.983085 ignition[1042]: INFO : Ignition 2.14.0 Feb 9 10:27:40.983085 ignition[1042]: INFO : Stage: umount Feb 9 10:27:40.983085 ignition[1042]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 10:27:40.983085 ignition[1042]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 10:27:40.983085 ignition[1042]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 10:27:40.983085 ignition[1042]: INFO : umount: umount passed Feb 9 10:27:40.983085 ignition[1042]: INFO : Ignition finished successfully Feb 9 10:27:40.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:41.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:41.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:41.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.297650 systemd[1]: Reached target ignition-complete.target. Feb 9 10:27:40.323648 systemd[1]: Starting initrd-parse-etc.service... Feb 9 10:27:40.371063 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 10:27:40.371162 systemd[1]: Finished initrd-parse-etc.service. Feb 9 10:27:40.417067 systemd[1]: Reached target initrd-fs.target. Feb 9 10:27:40.441612 systemd[1]: Reached target initrd.target. Feb 9 10:27:40.458605 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 10:27:41.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.459513 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 10:27:40.516509 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 10:27:40.522323 systemd[1]: Starting initrd-cleanup.service... Feb 9 10:27:41.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.557328 systemd[1]: Stopped target nss-lookup.target. Feb 9 10:27:41.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.573838 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 10:27:41.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.590659 systemd[1]: Stopped target timers.target. Feb 9 10:27:41.166000 audit: BPF prog-id=6 op=UNLOAD Feb 9 10:27:40.605015 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 10:27:41.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.605080 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 10:27:41.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.617015 systemd[1]: Stopped target initrd.target. Feb 9 10:27:41.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.653272 systemd[1]: Stopped target basic.target. Feb 9 10:27:41.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.670523 systemd[1]: Stopped target ignition-complete.target. Feb 9 10:27:40.684684 systemd[1]: Stopped target ignition-diskful.target. Feb 9 10:27:41.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.700529 systemd[1]: Stopped target initrd-root-device.target. Feb 9 10:27:40.715801 systemd[1]: Stopped target remote-fs.target. Feb 9 10:27:41.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.720837 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 10:27:41.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.735216 systemd[1]: Stopped target sysinit.target. Feb 9 10:27:41.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.750193 systemd[1]: Stopped target local-fs.target. Feb 9 10:27:41.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.760401 systemd[1]: Stopped target local-fs-pre.target. Feb 9 10:27:41.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:41.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.774854 systemd[1]: Stopped target swap.target. Feb 9 10:27:41.314690 kernel: hv_netvsc 0022487b-ccd2-0022-487b-ccd20022487b eth0: Data path switched from VF: enP49969s1 Feb 9 10:27:40.789327 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 10:27:40.789392 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 10:27:40.802276 systemd[1]: Stopped target cryptsetup.target. Feb 9 10:27:40.832763 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 10:27:40.832830 systemd[1]: Stopped dracut-initqueue.service. Feb 9 10:27:40.848809 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 10:27:40.848856 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 10:27:41.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:40.880623 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 10:27:40.880670 systemd[1]: Stopped ignition-files.service. Feb 9 10:27:40.894380 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 10:27:40.894436 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 10:27:40.908733 systemd[1]: Stopping ignition-mount.service... Feb 9 10:27:40.912840 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 10:27:41.409989 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 10:27:41.410020 iscsid[854]: iscsid shutting down. Feb 9 10:27:40.912901 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 10:27:40.925839 systemd[1]: Stopping sysroot-boot.service... Feb 9 10:27:40.946696 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 10:27:40.946777 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 10:27:40.955568 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 10:27:40.955611 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 10:27:40.965551 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 10:27:40.965654 systemd[1]: Finished initrd-cleanup.service. Feb 9 10:27:40.977070 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 10:27:40.977242 systemd[1]: Stopped ignition-mount.service. Feb 9 10:27:40.988431 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 10:27:40.988503 systemd[1]: Stopped ignition-disks.service. Feb 9 10:27:40.996155 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 10:27:40.996210 systemd[1]: Stopped ignition-kargs.service. Feb 9 10:27:41.004855 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 10:27:41.004900 systemd[1]: Stopped ignition-fetch.service. Feb 9 10:27:41.017616 systemd[1]: Stopped target network.target. Feb 9 10:27:41.042057 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 10:27:41.042122 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 10:27:41.051053 systemd[1]: Stopped target paths.target. Feb 9 10:27:41.059527 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 10:27:41.063185 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 10:27:41.069356 systemd[1]: Stopped target slices.target. Feb 9 10:27:41.077604 systemd[1]: Stopped target sockets.target. Feb 9 10:27:41.087141 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 10:27:41.087191 systemd[1]: Closed iscsid.socket. Feb 9 10:27:41.094919 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 10:27:41.094941 systemd[1]: Closed iscsiuio.socket. Feb 9 10:27:41.102844 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 10:27:41.102888 systemd[1]: Stopped ignition-setup.service. Feb 9 10:27:41.110876 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:27:41.121986 systemd[1]: Stopping systemd-resolved.service... Feb 9 10:27:41.130209 systemd-networkd[845]: eth0: DHCPv6 lease lost Feb 9 10:27:41.410000 audit: BPF prog-id=9 op=UNLOAD Feb 9 10:27:41.131552 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 10:27:41.132098 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 10:27:41.132198 systemd[1]: Stopped sysroot-boot.service. Feb 9 10:27:41.140037 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:27:41.140130 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:27:41.150034 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 10:27:41.150134 systemd[1]: Stopped systemd-resolved.service. Feb 9 10:27:41.158616 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 10:27:41.158658 systemd[1]: Closed systemd-networkd.socket. Feb 9 10:27:41.167196 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 10:27:41.167242 systemd[1]: Stopped initrd-setup-root.service. Feb 9 10:27:41.176021 systemd[1]: Stopping network-cleanup.service... Feb 9 10:27:41.185642 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 10:27:41.185701 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 10:27:41.190856 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 10:27:41.190906 systemd[1]: Stopped systemd-sysctl.service. Feb 9 10:27:41.210883 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 10:27:41.210927 systemd[1]: Stopped systemd-modules-load.service. Feb 9 10:27:41.215901 systemd[1]: Stopping systemd-udevd.service... Feb 9 10:27:41.225092 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 10:27:41.225622 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 10:27:41.225752 systemd[1]: Stopped systemd-udevd.service. Feb 9 10:27:41.233697 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 10:27:41.233749 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 10:27:41.242249 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 10:27:41.242283 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 10:27:41.247135 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 10:27:41.247192 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 10:27:41.256137 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 10:27:41.256188 systemd[1]: Stopped dracut-cmdline.service. Feb 9 10:27:41.264637 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 10:27:41.264678 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 10:27:41.274280 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 10:27:41.283956 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 10:27:41.284016 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 10:27:41.292380 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 10:27:41.292477 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 10:27:41.339922 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 10:27:41.340037 systemd[1]: Stopped network-cleanup.service. Feb 9 10:27:41.350684 systemd[1]: Reached target initrd-switch-root.target. Feb 9 10:27:41.361445 systemd[1]: Starting initrd-switch-root.service... Feb 9 10:27:41.379602 systemd[1]: Switching root. Feb 9 10:27:41.412006 systemd-journald[276]: Journal stopped Feb 9 10:27:52.049046 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 10:27:52.049066 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 10:27:52.049077 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 10:27:52.049086 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 10:27:52.049094 kernel: SELinux: policy capability open_perms=1 Feb 9 10:27:52.049102 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 10:27:52.049111 kernel: SELinux: policy capability always_check_network=0 Feb 9 10:27:52.049119 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 10:27:52.049127 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 10:27:52.049135 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 10:27:52.049145 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 10:27:52.049154 systemd[1]: Successfully loaded SELinux policy in 269.067ms. Feb 9 10:27:52.049178 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.019ms. Feb 9 10:27:52.049205 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 10:27:52.049218 systemd[1]: Detected virtualization microsoft. Feb 9 10:27:52.049227 systemd[1]: Detected architecture arm64. Feb 9 10:27:52.049236 systemd[1]: Detected first boot. Feb 9 10:27:52.049246 systemd[1]: Hostname set to . Feb 9 10:27:52.049256 systemd[1]: Initializing machine ID from random generator. Feb 9 10:27:52.049266 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 10:27:52.049274 kernel: kauditd_printk_skb: 38 callbacks suppressed Feb 9 10:27:52.049284 kernel: audit: type=1400 audit(1707474465.327:86): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:27:52.049297 kernel: audit: type=1300 audit(1707474465.327:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.049307 kernel: audit: type=1327 audit(1707474465.327:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:52.049316 kernel: audit: type=1400 audit(1707474465.337:87): avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:27:52.049326 kernel: audit: type=1300 audit(1707474465.337:87): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.049335 kernel: audit: type=1307 audit(1707474465.337:87): cwd="/" Feb 9 10:27:52.049346 kernel: audit: type=1302 audit(1707474465.337:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:52.049355 kernel: audit: type=1302 audit(1707474465.337:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:52.049365 kernel: audit: type=1327 audit(1707474465.337:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:52.049374 systemd[1]: Populated /etc with preset unit settings. Feb 9 10:27:52.049384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:27:52.049405 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:27:52.049580 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:27:52.049605 kernel: audit: type=1334 audit(1707474471.300:88): prog-id=12 op=LOAD Feb 9 10:27:52.049615 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 10:27:52.049625 kernel: audit: type=1334 audit(1707474471.300:89): prog-id=3 op=UNLOAD Feb 9 10:27:52.052617 systemd[1]: Stopped iscsiuio.service. Feb 9 10:27:52.052642 kernel: audit: type=1334 audit(1707474471.300:90): prog-id=13 op=LOAD Feb 9 10:27:52.052652 kernel: audit: type=1334 audit(1707474471.300:91): prog-id=14 op=LOAD Feb 9 10:27:52.052667 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 10:27:52.052679 kernel: audit: type=1334 audit(1707474471.300:92): prog-id=4 op=UNLOAD Feb 9 10:27:52.052689 systemd[1]: Stopped iscsid.service. Feb 9 10:27:52.052698 kernel: audit: type=1334 audit(1707474471.300:93): prog-id=5 op=UNLOAD Feb 9 10:27:52.052708 kernel: audit: type=1131 audit(1707474471.302:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.052717 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 10:27:52.052726 kernel: audit: type=1334 audit(1707474471.331:95): prog-id=12 op=UNLOAD Feb 9 10:27:52.052736 systemd[1]: Stopped initrd-switch-root.service. Feb 9 10:27:52.052745 kernel: audit: type=1131 audit(1707474471.331:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.052756 kernel: audit: type=1131 audit(1707474471.362:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.052766 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 10:27:52.052776 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 10:27:52.052786 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 10:27:52.052795 systemd[1]: Created slice system-getty.slice. Feb 9 10:27:52.052805 systemd[1]: Created slice system-modprobe.slice. Feb 9 10:27:52.052814 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 10:27:52.052824 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 10:27:52.052835 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 10:27:52.052845 systemd[1]: Created slice user.slice. Feb 9 10:27:52.052854 systemd[1]: Started systemd-ask-password-console.path. Feb 9 10:27:52.052864 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 10:27:52.052873 systemd[1]: Set up automount boot.automount. Feb 9 10:27:52.052884 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 10:27:52.052893 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 10:27:52.052904 systemd[1]: Stopped target initrd-fs.target. Feb 9 10:27:52.052915 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 10:27:52.052925 systemd[1]: Reached target integritysetup.target. Feb 9 10:27:52.052934 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 10:27:52.052943 systemd[1]: Reached target remote-fs.target. Feb 9 10:27:52.052953 systemd[1]: Reached target slices.target. Feb 9 10:27:52.052962 systemd[1]: Reached target swap.target. Feb 9 10:27:52.052971 systemd[1]: Reached target torcx.target. Feb 9 10:27:52.052982 systemd[1]: Reached target veritysetup.target. Feb 9 10:27:52.052992 systemd[1]: Listening on systemd-coredump.socket. Feb 9 10:27:52.053002 systemd[1]: Listening on systemd-initctl.socket. Feb 9 10:27:52.053011 systemd[1]: Listening on systemd-networkd.socket. Feb 9 10:27:52.053021 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 10:27:52.053031 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 10:27:52.053041 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 10:27:52.053051 systemd[1]: Mounting dev-hugepages.mount... Feb 9 10:27:52.053061 systemd[1]: Mounting dev-mqueue.mount... Feb 9 10:27:52.053070 systemd[1]: Mounting media.mount... Feb 9 10:27:52.053080 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 10:27:52.053090 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 10:27:52.053100 systemd[1]: Mounting tmp.mount... Feb 9 10:27:52.053109 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 10:27:52.053119 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 10:27:52.053130 systemd[1]: Starting kmod-static-nodes.service... Feb 9 10:27:52.053139 systemd[1]: Starting modprobe@configfs.service... Feb 9 10:27:52.053148 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 10:27:52.053158 systemd[1]: Starting modprobe@drm.service... Feb 9 10:27:52.053190 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 10:27:52.053200 systemd[1]: Starting modprobe@fuse.service... Feb 9 10:27:52.053209 systemd[1]: Starting modprobe@loop.service... Feb 9 10:27:52.053220 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 10:27:52.053230 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 10:27:52.053241 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 10:27:52.053251 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 10:27:52.053261 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 10:27:52.053270 systemd[1]: Stopped systemd-journald.service. Feb 9 10:27:52.053280 systemd[1]: systemd-journald.service: Consumed 2.992s CPU time. Feb 9 10:27:52.053289 systemd[1]: Starting systemd-journald.service... Feb 9 10:27:52.053299 systemd[1]: Starting systemd-modules-load.service... Feb 9 10:27:52.053308 kernel: loop: module loaded Feb 9 10:27:52.053319 systemd[1]: Starting systemd-network-generator.service... Feb 9 10:27:52.053330 systemd[1]: Starting systemd-remount-fs.service... Feb 9 10:27:52.053340 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 10:27:52.053349 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 10:27:52.053359 kernel: fuse: init (API version 7.34) Feb 9 10:27:52.053367 systemd[1]: Stopped verity-setup.service. Feb 9 10:27:52.053377 systemd[1]: Mounted dev-hugepages.mount. Feb 9 10:27:52.053387 systemd[1]: Mounted dev-mqueue.mount. Feb 9 10:27:52.053396 systemd[1]: Mounted media.mount. Feb 9 10:27:52.053409 systemd-journald[1181]: Journal started Feb 9 10:27:52.053461 systemd-journald[1181]: Runtime Journal (/run/log/journal/ac7f66821b774c09a4f55c8642c5c3c8) is 8.0M, max 78.6M, 70.6M free. Feb 9 10:27:43.555000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 10:27:44.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:27:44.233000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 10:27:44.233000 audit: BPF prog-id=10 op=LOAD Feb 9 10:27:44.233000 audit: BPF prog-id=10 op=UNLOAD Feb 9 10:27:44.233000 audit: BPF prog-id=11 op=LOAD Feb 9 10:27:44.233000 audit: BPF prog-id=11 op=UNLOAD Feb 9 10:27:45.327000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 10:27:45.327000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001458a2 a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.327000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:45.337000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 10:27:45.337000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145979 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:45.337000 audit: CWD cwd="/" Feb 9 10:27:45.337000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:45.337000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:45.337000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 10:27:51.300000 audit: BPF prog-id=12 op=LOAD Feb 9 10:27:51.300000 audit: BPF prog-id=3 op=UNLOAD Feb 9 10:27:51.300000 audit: BPF prog-id=13 op=LOAD Feb 9 10:27:51.300000 audit: BPF prog-id=14 op=LOAD Feb 9 10:27:51.300000 audit: BPF prog-id=4 op=UNLOAD Feb 9 10:27:51.300000 audit: BPF prog-id=5 op=UNLOAD Feb 9 10:27:51.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.331000 audit: BPF prog-id=12 op=UNLOAD Feb 9 10:27:51.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:51.942000 audit: BPF prog-id=15 op=LOAD Feb 9 10:27:51.942000 audit: BPF prog-id=16 op=LOAD Feb 9 10:27:51.942000 audit: BPF prog-id=17 op=LOAD Feb 9 10:27:51.942000 audit: BPF prog-id=13 op=UNLOAD Feb 9 10:27:51.942000 audit: BPF prog-id=14 op=UNLOAD Feb 9 10:27:52.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.046000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 10:27:52.046000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffc2d25fc0 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:52.046000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 10:27:51.299097 systemd[1]: Queued start job for default target multi-user.target. Feb 9 10:27:45.289242 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:27:51.302445 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 10:27:45.315033 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:27:51.302766 systemd[1]: systemd-journald.service: Consumed 2.992s CPU time. Feb 9 10:27:45.315055 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:27:45.315096 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 10:27:45.315106 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 10:27:45.315139 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 10:27:45.315152 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 10:27:45.315390 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 10:27:45.315424 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 10:27:45.315436 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 10:27:45.315805 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 10:27:45.315839 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 10:27:45.315857 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 10:27:45.315871 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 10:27:45.315888 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 10:27:45.315901 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:45Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 10:27:50.339182 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:50.339442 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:50.339539 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:50.339696 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 10:27:50.339745 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 10:27:50.339800 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-09T10:27:50Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 10:27:52.066679 systemd[1]: Started systemd-journald.service. Feb 9 10:27:52.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.067454 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 10:27:52.071788 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 10:27:52.076455 systemd[1]: Mounted tmp.mount. Feb 9 10:27:52.080077 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 10:27:52.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.084772 systemd[1]: Finished kmod-static-nodes.service. Feb 9 10:27:52.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.089525 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 10:27:52.089646 systemd[1]: Finished modprobe@configfs.service. Feb 9 10:27:52.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.094967 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 10:27:52.095089 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 10:27:52.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.099861 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 10:27:52.099987 systemd[1]: Finished modprobe@drm.service. Feb 9 10:27:52.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.104379 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 10:27:52.104497 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 10:27:52.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.109721 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 10:27:52.109845 systemd[1]: Finished modprobe@fuse.service. Feb 9 10:27:52.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.114732 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 10:27:52.115013 systemd[1]: Finished modprobe@loop.service. Feb 9 10:27:52.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.119727 systemd[1]: Finished systemd-network-generator.service. Feb 9 10:27:52.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.125667 systemd[1]: Finished systemd-remount-fs.service. Feb 9 10:27:52.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.131576 systemd[1]: Reached target network-pre.target. Feb 9 10:27:52.137569 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 10:27:52.143555 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 10:27:52.148004 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 10:27:52.160496 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 10:27:52.166197 systemd[1]: Starting systemd-journal-flush.service... Feb 9 10:27:52.171665 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 10:27:52.172840 systemd[1]: Starting systemd-random-seed.service... Feb 9 10:27:52.178247 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 10:27:52.179405 systemd[1]: Starting systemd-sysusers.service... Feb 9 10:27:52.185655 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 10:27:52.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.191408 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 10:27:52.197138 systemd[1]: Finished systemd-modules-load.service. Feb 9 10:27:52.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.202448 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 10:27:52.208465 systemd[1]: Starting systemd-sysctl.service... Feb 9 10:27:52.213704 systemd[1]: Starting systemd-udev-settle.service... Feb 9 10:27:52.218930 systemd-journald[1181]: Time spent on flushing to /var/log/journal/ac7f66821b774c09a4f55c8642c5c3c8 is 14.821ms for 1113 entries. Feb 9 10:27:52.218930 systemd-journald[1181]: System Journal (/var/log/journal/ac7f66821b774c09a4f55c8642c5c3c8) is 8.0M, max 2.6G, 2.6G free. Feb 9 10:27:52.287475 systemd-journald[1181]: Received client request to flush runtime journal. Feb 9 10:27:52.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.231102 systemd[1]: Finished systemd-random-seed.service. Feb 9 10:27:52.287725 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 10:27:52.236684 systemd[1]: Reached target first-boot-complete.target. Feb 9 10:27:52.288401 systemd[1]: Finished systemd-journal-flush.service. Feb 9 10:27:52.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.336364 systemd[1]: Finished systemd-sysctl.service. Feb 9 10:27:52.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:52.683466 systemd[1]: Finished systemd-sysusers.service. Feb 9 10:27:52.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.281396 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 10:27:53.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.286000 audit: BPF prog-id=18 op=LOAD Feb 9 10:27:53.286000 audit: BPF prog-id=19 op=LOAD Feb 9 10:27:53.286000 audit: BPF prog-id=7 op=UNLOAD Feb 9 10:27:53.286000 audit: BPF prog-id=8 op=UNLOAD Feb 9 10:27:53.287619 systemd[1]: Starting systemd-udevd.service... Feb 9 10:27:53.305664 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 9 10:27:53.451584 systemd[1]: Started systemd-udevd.service. Feb 9 10:27:53.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.462000 audit: BPF prog-id=20 op=LOAD Feb 9 10:27:53.463340 systemd[1]: Starting systemd-networkd.service... Feb 9 10:27:53.487667 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 10:27:53.552072 systemd[1]: Starting systemd-userdbd.service... Feb 9 10:27:53.551000 audit: BPF prog-id=21 op=LOAD Feb 9 10:27:53.551000 audit: BPF prog-id=22 op=LOAD Feb 9 10:27:53.551000 audit: BPF prog-id=23 op=LOAD Feb 9 10:27:53.582774 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 10:27:53.582922 kernel: hv_vmbus: registering driver hv_utils Feb 9 10:27:53.583000 audit[1203]: AVC avc: denied { confidentiality } for pid=1203 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 10:27:53.595764 kernel: hv_vmbus: registering driver hv_balloon Feb 9 10:27:53.595904 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 10:27:53.596591 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 10:27:53.313917 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 10:27:53.374183 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 10:27:53.374213 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 10:27:53.374227 systemd-journald[1181]: Time jumped backwards, rotating. Feb 9 10:27:53.374292 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 10:27:53.374305 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 10:27:53.374318 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 10:27:53.374331 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 10:27:53.374343 kernel: Console: switching to colour dummy device 80x25 Feb 9 10:27:53.374354 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 10:27:53.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.583000 audit[1203]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaab6597980 a1=aa2c a2=ffffa43524b0 a3=aaaab64f7010 items=12 ppid=1198 pid=1203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:53.583000 audit: CWD cwd="/" Feb 9 10:27:53.583000 audit: PATH item=0 name=(null) inode=6289 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=1 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=2 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=3 name=(null) inode=10836 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=4 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=5 name=(null) inode=10837 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=6 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=7 name=(null) inode=10838 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=8 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=9 name=(null) inode=10839 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=10 name=(null) inode=10835 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PATH item=11 name=(null) inode=10840 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:27:53.583000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 10:27:53.353282 systemd[1]: Started systemd-userdbd.service. Feb 9 10:27:53.552472 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1212) Feb 9 10:27:53.562868 systemd-networkd[1219]: lo: Link UP Feb 9 10:27:53.562882 systemd-networkd[1219]: lo: Gained carrier Feb 9 10:27:53.563292 systemd-networkd[1219]: Enumeration completed Feb 9 10:27:53.563390 systemd[1]: Started systemd-networkd.service. Feb 9 10:27:53.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.572470 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:27:53.580081 systemd[1]: Finished systemd-udev-settle.service. Feb 9 10:27:53.582790 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:27:53.583000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.586875 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 10:27:53.593474 systemd[1]: Starting lvm2-activation-early.service... Feb 9 10:27:53.640447 kernel: mlx5_core c331:00:02.0 enP49969s1: Link up Feb 9 10:27:53.670179 systemd-networkd[1219]: enP49969s1: Link UP Feb 9 10:27:53.670451 kernel: hv_netvsc 0022487b-ccd2-0022-487b-ccd20022487b eth0: Data path switched to VF: enP49969s1 Feb 9 10:27:53.670654 systemd-networkd[1219]: eth0: Link UP Feb 9 10:27:53.670722 systemd-networkd[1219]: eth0: Gained carrier Feb 9 10:27:53.675696 systemd-networkd[1219]: enP49969s1: Gained carrier Feb 9 10:27:53.685546 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:27:53.861644 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:27:53.898465 systemd[1]: Finished lvm2-activation-early.service. Feb 9 10:27:53.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.903726 systemd[1]: Reached target cryptsetup.target. Feb 9 10:27:53.909791 systemd[1]: Starting lvm2-activation.service... Feb 9 10:27:53.913767 lvm[1279]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 10:27:53.934356 systemd[1]: Finished lvm2-activation.service. Feb 9 10:27:53.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:53.938881 systemd[1]: Reached target local-fs-pre.target. Feb 9 10:27:53.943272 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 10:27:53.943304 systemd[1]: Reached target local-fs.target. Feb 9 10:27:53.947491 systemd[1]: Reached target machines.target. Feb 9 10:27:53.952922 systemd[1]: Starting ldconfig.service... Feb 9 10:27:53.956706 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 10:27:53.956776 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:27:53.958062 systemd[1]: Starting systemd-boot-update.service... Feb 9 10:27:53.962909 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 10:27:53.969512 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 10:27:53.974521 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:27:53.974579 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 10:27:53.975747 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 10:27:54.005050 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1281 (bootctl) Feb 9 10:27:54.006292 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 10:27:54.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:54.143741 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 10:27:55.003112 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 10:27:55.003697 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 10:27:55.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.064175 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 10:27:55.150751 systemd-fsck[1289]: fsck.fat 4.2 (2021-01-31) Feb 9 10:27:55.150751 systemd-fsck[1289]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 10:27:55.152007 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 10:27:55.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.159865 systemd[1]: Mounting boot.mount... Feb 9 10:27:55.171272 systemd[1]: Mounted boot.mount. Feb 9 10:27:55.177444 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 10:27:55.181969 systemd[1]: Finished systemd-boot-update.service. Feb 9 10:27:55.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.225772 systemd-tmpfiles[1284]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 10:27:55.309572 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 10:27:55.315291 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:27:55.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.705131 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 10:27:55.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.711618 systemd[1]: Starting audit-rules.service... Feb 9 10:27:55.716496 systemd[1]: Starting clean-ca-certificates.service... Feb 9 10:27:55.721711 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 10:27:55.727000 audit: BPF prog-id=24 op=LOAD Feb 9 10:27:55.729407 systemd[1]: Starting systemd-resolved.service... Feb 9 10:27:55.732000 audit: BPF prog-id=25 op=LOAD Feb 9 10:27:55.734799 systemd[1]: Starting systemd-timesyncd.service... Feb 9 10:27:55.740210 systemd[1]: Starting systemd-update-utmp.service... Feb 9 10:27:55.776000 audit[1300]: SYSTEM_BOOT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.779879 systemd[1]: Finished systemd-update-utmp.service. Feb 9 10:27:55.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.843871 systemd[1]: Finished clean-ca-certificates.service. Feb 9 10:27:55.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.848996 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 10:27:55.885815 systemd[1]: Started systemd-timesyncd.service. Feb 9 10:27:55.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.890655 systemd[1]: Reached target time-set.target. Feb 9 10:27:55.902570 systemd-resolved[1298]: Positive Trust Anchors: Feb 9 10:27:55.902581 systemd-resolved[1298]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 10:27:55.902607 systemd-resolved[1298]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 10:27:55.928338 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 10:27:55.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.953959 systemd-resolved[1298]: Using system hostname 'ci-3510.3.2-a-f964c266ce'. Feb 9 10:27:55.955784 systemd[1]: Started systemd-resolved.service. Feb 9 10:27:55.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:27:55.960479 systemd[1]: Reached target network.target. Feb 9 10:27:55.964665 systemd[1]: Reached target network-online.target. Feb 9 10:27:55.969744 systemd[1]: Reached target nss-lookup.target. Feb 9 10:27:56.158569 kernel: kauditd_printk_skb: 83 callbacks suppressed Feb 9 10:27:56.158681 kernel: audit: type=1305 audit(1707474476.153:164): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:27:56.153000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 10:27:56.169350 augenrules[1316]: No rules Feb 9 10:27:56.153000 audit[1316]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8424e40 a2=420 a3=0 items=0 ppid=1295 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.170501 systemd[1]: Finished audit-rules.service. Feb 9 10:27:56.191686 kernel: audit: type=1300 audit(1707474476.153:164): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd8424e40 a2=420 a3=0 items=0 ppid=1295 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:27:56.191755 kernel: audit: type=1327 audit(1707474476.153:164): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:27:56.153000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 10:27:56.258957 systemd-timesyncd[1299]: Contacted time server 192.48.105.15:123 (0.flatcar.pool.ntp.org). Feb 9 10:27:56.259032 systemd-timesyncd[1299]: Initial clock synchronization to Fri 2024-02-09 10:27:56.273557 UTC. Feb 9 10:28:02.653420 ldconfig[1280]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 10:28:02.663258 systemd[1]: Finished ldconfig.service. Feb 9 10:28:02.669130 systemd[1]: Starting systemd-update-done.service... Feb 9 10:28:02.698852 systemd[1]: Finished systemd-update-done.service. Feb 9 10:28:02.703583 systemd[1]: Reached target sysinit.target. Feb 9 10:28:02.707835 systemd[1]: Started motdgen.path. Feb 9 10:28:02.711548 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 10:28:02.717593 systemd[1]: Started logrotate.timer. Feb 9 10:28:02.721751 systemd[1]: Started mdadm.timer. Feb 9 10:28:02.725281 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 10:28:02.729884 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 10:28:02.729915 systemd[1]: Reached target paths.target. Feb 9 10:28:02.734012 systemd[1]: Reached target timers.target. Feb 9 10:28:02.738621 systemd[1]: Listening on dbus.socket. Feb 9 10:28:02.743772 systemd[1]: Starting docker.socket... Feb 9 10:28:02.749375 systemd[1]: Listening on sshd.socket. Feb 9 10:28:02.753671 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:28:02.754153 systemd[1]: Listening on docker.socket. Feb 9 10:28:02.758298 systemd[1]: Reached target sockets.target. Feb 9 10:28:02.762484 systemd[1]: Reached target basic.target. Feb 9 10:28:02.766532 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:28:02.766563 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 10:28:02.767725 systemd[1]: Starting containerd.service... Feb 9 10:28:02.772338 systemd[1]: Starting dbus.service... Feb 9 10:28:02.776604 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 10:28:02.781827 systemd[1]: Starting extend-filesystems.service... Feb 9 10:28:02.789341 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 10:28:02.790531 systemd[1]: Starting motdgen.service... Feb 9 10:28:02.794978 systemd[1]: Started nvidia.service. Feb 9 10:28:02.801414 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 10:28:02.806704 systemd[1]: Starting prepare-critools.service... Feb 9 10:28:02.811862 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 10:28:02.817348 systemd[1]: Starting sshd-keygen.service... Feb 9 10:28:02.825658 systemd[1]: Starting systemd-logind.service... Feb 9 10:28:02.829764 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 10:28:02.829826 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 10:28:02.830280 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 10:28:02.831026 systemd[1]: Starting update-engine.service... Feb 9 10:28:02.836286 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 10:28:02.845354 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 10:28:02.845549 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 10:28:02.855697 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 10:28:02.855859 systemd[1]: Finished motdgen.service. Feb 9 10:28:02.860752 extend-filesystems[1327]: Found sda Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda1 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda2 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda3 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found usr Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda4 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda6 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda7 Feb 9 10:28:02.864603 extend-filesystems[1327]: Found sda9 Feb 9 10:28:02.864603 extend-filesystems[1327]: Checking size of /dev/sda9 Feb 9 10:28:02.908399 jq[1326]: false Feb 9 10:28:02.908701 jq[1344]: true Feb 9 10:28:02.915461 env[1352]: time="2024-02-09T10:28:02.914754065Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 10:28:02.933225 env[1352]: time="2024-02-09T10:28:02.933166012Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 10:28:02.933357 env[1352]: time="2024-02-09T10:28:02.933337286Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936118 env[1352]: time="2024-02-09T10:28:02.936076992Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936118 env[1352]: time="2024-02-09T10:28:02.936115297Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936370 env[1352]: time="2024-02-09T10:28:02.936342048Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936370 env[1352]: time="2024-02-09T10:28:02.936366905Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936454 env[1352]: time="2024-02-09T10:28:02.936380634Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 10:28:02.936454 env[1352]: time="2024-02-09T10:28:02.936390360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936500 env[1352]: time="2024-02-09T10:28:02.936486064Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936730 env[1352]: time="2024-02-09T10:28:02.936704770Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936857 env[1352]: time="2024-02-09T10:28:02.936832415Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 10:28:02.936857 env[1352]: time="2024-02-09T10:28:02.936854550Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 10:28:02.936929 env[1352]: time="2024-02-09T10:28:02.936908265Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 10:28:02.936968 env[1352]: time="2024-02-09T10:28:02.936927798Z" level=info msg="metadata content store policy set" policy=shared Feb 9 10:28:02.949750 env[1352]: time="2024-02-09T10:28:02.949709955Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 10:28:02.949922 env[1352]: time="2024-02-09T10:28:02.949903564Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 10:28:02.949995 env[1352]: time="2024-02-09T10:28:02.949982216Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 10:28:02.950109 env[1352]: time="2024-02-09T10:28:02.950094011Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.950315 env[1352]: time="2024-02-09T10:28:02.950296666Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.950402 env[1352]: time="2024-02-09T10:28:02.950388287Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.950484 env[1352]: time="2024-02-09T10:28:02.950470942Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.950959 env[1352]: time="2024-02-09T10:28:02.950936492Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.951080 env[1352]: time="2024-02-09T10:28:02.951063136Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.951167 env[1352]: time="2024-02-09T10:28:02.951151715Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.951238 env[1352]: time="2024-02-09T10:28:02.951225044Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.951311 env[1352]: time="2024-02-09T10:28:02.951298933Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 10:28:02.951565 env[1352]: time="2024-02-09T10:28:02.951548460Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 10:28:02.951765 env[1352]: time="2024-02-09T10:28:02.951748913Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 10:28:02.952153 env[1352]: time="2024-02-09T10:28:02.952117078Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 10:28:02.952217 env[1352]: time="2024-02-09T10:28:02.952169233Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952217 env[1352]: time="2024-02-09T10:28:02.952185124Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 10:28:02.952273 env[1352]: time="2024-02-09T10:28:02.952240441Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952273 env[1352]: time="2024-02-09T10:28:02.952254410Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952273 env[1352]: time="2024-02-09T10:28:02.952267579Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952328 env[1352]: time="2024-02-09T10:28:02.952279947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952328 env[1352]: time="2024-02-09T10:28:02.952293996Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952328 env[1352]: time="2024-02-09T10:28:02.952307846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952328 env[1352]: time="2024-02-09T10:28:02.952321214Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952401 env[1352]: time="2024-02-09T10:28:02.952334143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952401 env[1352]: time="2024-02-09T10:28:02.952349673Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 10:28:02.952540 env[1352]: time="2024-02-09T10:28:02.952509380Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952540 env[1352]: time="2024-02-09T10:28:02.952538159Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952592 env[1352]: time="2024-02-09T10:28:02.952553409Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952592 env[1352]: time="2024-02-09T10:28:02.952567098Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 10:28:02.952592 env[1352]: time="2024-02-09T10:28:02.952581988Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 10:28:02.952658 env[1352]: time="2024-02-09T10:28:02.952593716Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 10:28:02.952658 env[1352]: time="2024-02-09T10:28:02.952610407Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 10:28:02.952658 env[1352]: time="2024-02-09T10:28:02.952645390Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 10:28:02.952894 env[1352]: time="2024-02-09T10:28:02.952843002Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 10:28:02.966063 env[1352]: time="2024-02-09T10:28:02.952902201Z" level=info msg="Connect containerd service" Feb 9 10:28:02.966063 env[1352]: time="2024-02-09T10:28:02.952932342Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 10:28:02.966063 env[1352]: time="2024-02-09T10:28:02.961046628Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 10:28:02.966063 env[1352]: time="2024-02-09T10:28:02.961309203Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 10:28:02.966063 env[1352]: time="2024-02-09T10:28:02.961346147Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 10:28:02.961504 systemd[1]: Started containerd.service. Feb 9 10:28:02.967744 systemd-logind[1340]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 10:28:02.968081 env[1352]: time="2024-02-09T10:28:02.968049293Z" level=info msg="Start subscribing containerd event" Feb 9 10:28:02.968194 env[1352]: time="2024-02-09T10:28:02.968179420Z" level=info msg="Start recovering state" Feb 9 10:28:02.968326 env[1352]: time="2024-02-09T10:28:02.968305344Z" level=info msg="Start event monitor" Feb 9 10:28:02.968400 env[1352]: time="2024-02-09T10:28:02.968387639Z" level=info msg="Start snapshots syncer" Feb 9 10:28:02.968468 env[1352]: time="2024-02-09T10:28:02.968456485Z" level=info msg="Start cni network conf syncer for default" Feb 9 10:28:02.968536 env[1352]: time="2024-02-09T10:28:02.968515484Z" level=info msg="Start streaming server" Feb 9 10:28:02.969768 systemd-logind[1340]: New seat seat0. Feb 9 10:28:02.975013 extend-filesystems[1327]: Old size kept for /dev/sda9 Feb 9 10:28:02.975013 extend-filesystems[1327]: Found sr0 Feb 9 10:28:02.979771 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 10:28:02.980055 systemd[1]: Finished extend-filesystems.service. Feb 9 10:28:02.997877 env[1352]: time="2024-02-09T10:28:02.997843584Z" level=info msg="containerd successfully booted in 0.083916s" Feb 9 10:28:03.002131 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 10:28:03.002309 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 10:28:03.047741 jq[1381]: true Feb 9 10:28:03.066543 tar[1346]: ./ Feb 9 10:28:03.066543 tar[1346]: ./macvlan Feb 9 10:28:03.069358 tar[1347]: crictl Feb 9 10:28:03.139999 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 10:28:03.153191 tar[1346]: ./static Feb 9 10:28:03.163603 bash[1422]: Updated "/home/core/.ssh/authorized_keys" Feb 9 10:28:03.164567 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 10:28:03.202121 dbus-daemon[1325]: [system] SELinux support is enabled Feb 9 10:28:03.213031 tar[1346]: ./vlan Feb 9 10:28:03.202281 systemd[1]: Started dbus.service. Feb 9 10:28:03.207750 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 10:28:03.207777 systemd[1]: Reached target system-config.target. Feb 9 10:28:03.217538 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 10:28:03.217561 systemd[1]: Reached target user-config.target. Feb 9 10:28:03.225971 systemd[1]: Started systemd-logind.service. Feb 9 10:28:03.230952 dbus-daemon[1325]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 10:28:03.267301 tar[1346]: ./portmap Feb 9 10:28:03.327503 tar[1346]: ./host-local Feb 9 10:28:03.376005 tar[1346]: ./vrf Feb 9 10:28:03.409279 tar[1346]: ./bridge Feb 9 10:28:03.483572 tar[1346]: ./tuning Feb 9 10:28:03.518442 tar[1346]: ./firewall Feb 9 10:28:03.558300 tar[1346]: ./host-device Feb 9 10:28:03.595948 update_engine[1343]: I0209 10:28:03.585649 1343 main.cc:92] Flatcar Update Engine starting Feb 9 10:28:03.621360 tar[1346]: ./sbr Feb 9 10:28:03.640505 systemd[1]: Started update-engine.service. Feb 9 10:28:03.646617 update_engine[1343]: I0209 10:28:03.640540 1343 update_check_scheduler.cc:74] Next update check in 3m3s Feb 9 10:28:03.650790 systemd[1]: Started locksmithd.service. Feb 9 10:28:03.655390 tar[1346]: ./loopback Feb 9 10:28:03.684541 tar[1346]: ./dhcp Feb 9 10:28:03.800682 systemd[1]: Finished prepare-critools.service. Feb 9 10:28:03.823087 tar[1346]: ./ptp Feb 9 10:28:03.851442 tar[1346]: ./ipvlan Feb 9 10:28:03.879225 tar[1346]: ./bandwidth Feb 9 10:28:03.936221 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 10:28:04.558652 sshd_keygen[1342]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 10:28:04.576308 systemd[1]: Finished sshd-keygen.service. Feb 9 10:28:04.582377 systemd[1]: Starting issuegen.service... Feb 9 10:28:04.587349 systemd[1]: Started waagent.service. Feb 9 10:28:04.591898 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 10:28:04.592064 systemd[1]: Finished issuegen.service. Feb 9 10:28:04.597614 systemd[1]: Starting systemd-user-sessions.service... Feb 9 10:28:04.624863 systemd[1]: Finished systemd-user-sessions.service. Feb 9 10:28:04.631371 systemd[1]: Started getty@tty1.service. Feb 9 10:28:04.636990 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 10:28:04.642001 systemd[1]: Reached target getty.target. Feb 9 10:28:04.646209 systemd[1]: Reached target multi-user.target. Feb 9 10:28:04.652066 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 10:28:04.669103 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 10:28:04.669274 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 10:28:04.674643 systemd[1]: Startup finished in 741ms (kernel) + 15.533s (initrd) + 21.793s (userspace) = 38.068s. Feb 9 10:28:04.913885 locksmithd[1427]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 10:28:05.172011 login[1449]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 10:28:05.172334 login[1448]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:28:05.219570 systemd[1]: Created slice user-500.slice. Feb 9 10:28:05.220636 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 10:28:05.224653 systemd-logind[1340]: New session 1 of user core. Feb 9 10:28:05.251477 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 10:28:05.252824 systemd[1]: Starting user@500.service... Feb 9 10:28:05.277280 (systemd)[1452]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:05.502534 systemd[1452]: Queued start job for default target default.target. Feb 9 10:28:05.503033 systemd[1452]: Reached target paths.target. Feb 9 10:28:05.503052 systemd[1452]: Reached target sockets.target. Feb 9 10:28:05.503063 systemd[1452]: Reached target timers.target. Feb 9 10:28:05.503072 systemd[1452]: Reached target basic.target. Feb 9 10:28:05.503116 systemd[1452]: Reached target default.target. Feb 9 10:28:05.503142 systemd[1452]: Startup finished in 220ms. Feb 9 10:28:05.503185 systemd[1]: Started user@500.service. Feb 9 10:28:05.504097 systemd[1]: Started session-1.scope. Feb 9 10:28:06.174126 login[1449]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 10:28:06.178120 systemd-logind[1340]: New session 2 of user core. Feb 9 10:28:06.178535 systemd[1]: Started session-2.scope. Feb 9 10:28:09.646823 waagent[1445]: 2024-02-09T10:28:09.646716Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 10:28:09.677207 waagent[1445]: 2024-02-09T10:28:09.677119Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 10:28:09.683079 waagent[1445]: 2024-02-09T10:28:09.682999Z INFO Daemon Daemon Python: 3.9.16 Feb 9 10:28:09.688006 waagent[1445]: 2024-02-09T10:28:09.687939Z INFO Daemon Daemon Run daemon Feb 9 10:28:09.692703 waagent[1445]: 2024-02-09T10:28:09.692646Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 10:28:09.709607 waagent[1445]: 2024-02-09T10:28:09.709497Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:28:09.724511 waagent[1445]: 2024-02-09T10:28:09.724374Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:28:09.734927 waagent[1445]: 2024-02-09T10:28:09.734860Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:28:09.740162 waagent[1445]: 2024-02-09T10:28:09.740099Z INFO Daemon Daemon Using waagent for provisioning Feb 9 10:28:09.746113 waagent[1445]: 2024-02-09T10:28:09.746056Z INFO Daemon Daemon Activate resource disk Feb 9 10:28:09.750918 waagent[1445]: 2024-02-09T10:28:09.750861Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 10:28:09.765212 waagent[1445]: 2024-02-09T10:28:09.765150Z INFO Daemon Daemon Found device: None Feb 9 10:28:09.769742 waagent[1445]: 2024-02-09T10:28:09.769682Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 10:28:09.778092 waagent[1445]: 2024-02-09T10:28:09.778032Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 10:28:09.789769 waagent[1445]: 2024-02-09T10:28:09.789709Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:28:09.795928 waagent[1445]: 2024-02-09T10:28:09.795869Z INFO Daemon Daemon Running default provisioning handler Feb 9 10:28:09.809009 waagent[1445]: 2024-02-09T10:28:09.808884Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 10:28:09.824161 waagent[1445]: 2024-02-09T10:28:09.824033Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 10:28:09.833992 waagent[1445]: 2024-02-09T10:28:09.833923Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 10:28:09.839669 waagent[1445]: 2024-02-09T10:28:09.839598Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 10:28:09.862117 waagent[1445]: 2024-02-09T10:28:09.861990Z INFO Daemon Daemon Successfully mounted dvd Feb 9 10:28:09.943667 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 10:28:09.971857 waagent[1445]: 2024-02-09T10:28:09.971710Z INFO Daemon Daemon Detect protocol endpoint Feb 9 10:28:09.977190 waagent[1445]: 2024-02-09T10:28:09.977115Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 10:28:09.983616 waagent[1445]: 2024-02-09T10:28:09.983543Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 10:28:09.990325 waagent[1445]: 2024-02-09T10:28:09.990260Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 10:28:09.996154 waagent[1445]: 2024-02-09T10:28:09.996092Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 10:28:10.001361 waagent[1445]: 2024-02-09T10:28:10.001299Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 10:28:10.181863 waagent[1445]: 2024-02-09T10:28:10.181788Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 10:28:10.190207 waagent[1445]: 2024-02-09T10:28:10.190161Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 10:28:10.195794 waagent[1445]: 2024-02-09T10:28:10.195694Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 10:28:10.799012 waagent[1445]: 2024-02-09T10:28:10.798860Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 10:28:10.813968 waagent[1445]: 2024-02-09T10:28:10.813899Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 10:28:10.819780 waagent[1445]: 2024-02-09T10:28:10.819721Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 10:28:10.895104 waagent[1445]: 2024-02-09T10:28:10.894959Z INFO Daemon Daemon Found private key matching thumbprint C4F3AFD549C484368C42AC45F6DD5AB917593478 Feb 9 10:28:10.903739 waagent[1445]: 2024-02-09T10:28:10.903659Z INFO Daemon Daemon Certificate with thumbprint 4F8A23A38C6431F8A45AF11FF791A61AACB0A99E has no matching private key. Feb 9 10:28:10.913379 waagent[1445]: 2024-02-09T10:28:10.913303Z INFO Daemon Daemon Fetch goal state completed Feb 9 10:28:10.966219 waagent[1445]: 2024-02-09T10:28:10.966161Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 53afe9f8-554f-4cd8-8cae-c83a7101b49f New eTag: 11787951219580824828] Feb 9 10:28:10.977104 waagent[1445]: 2024-02-09T10:28:10.977028Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:28:10.993828 waagent[1445]: 2024-02-09T10:28:10.993765Z INFO Daemon Daemon Starting provisioning Feb 9 10:28:10.998659 waagent[1445]: 2024-02-09T10:28:10.998592Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 10:28:11.003246 waagent[1445]: 2024-02-09T10:28:11.003189Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-f964c266ce] Feb 9 10:28:11.044556 waagent[1445]: 2024-02-09T10:28:11.044404Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-f964c266ce] Feb 9 10:28:11.051466 waagent[1445]: 2024-02-09T10:28:11.051323Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 10:28:11.058592 waagent[1445]: 2024-02-09T10:28:11.058517Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 10:28:11.074687 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 10:28:11.074863 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 10:28:11.074921 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 10:28:11.075156 systemd[1]: Stopping systemd-networkd.service... Feb 9 10:28:11.080467 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 10:28:11.082362 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 10:28:11.082544 systemd[1]: Stopped systemd-networkd.service. Feb 9 10:28:11.084655 systemd[1]: Starting systemd-networkd.service... Feb 9 10:28:11.111603 systemd-networkd[1493]: enP49969s1: Link UP Feb 9 10:28:11.111613 systemd-networkd[1493]: enP49969s1: Gained carrier Feb 9 10:28:11.112770 systemd-networkd[1493]: eth0: Link UP Feb 9 10:28:11.112781 systemd-networkd[1493]: eth0: Gained carrier Feb 9 10:28:11.113102 systemd-networkd[1493]: lo: Link UP Feb 9 10:28:11.113111 systemd-networkd[1493]: lo: Gained carrier Feb 9 10:28:11.113341 systemd-networkd[1493]: eth0: Gained IPv6LL Feb 9 10:28:11.114494 systemd-networkd[1493]: Enumeration completed Feb 9 10:28:11.114601 systemd[1]: Started systemd-networkd.service. Feb 9 10:28:11.116145 systemd-networkd[1493]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 10:28:11.116282 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 10:28:11.127904 waagent[1445]: 2024-02-09T10:28:11.127489Z INFO Daemon Daemon Create user account if not exists Feb 9 10:28:11.138583 waagent[1445]: 2024-02-09T10:28:11.138487Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 10:28:11.138775 systemd-networkd[1493]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 10:28:11.147952 waagent[1445]: 2024-02-09T10:28:11.147862Z INFO Daemon Daemon Configure sudoer Feb 9 10:28:11.153529 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 10:28:11.153988 waagent[1445]: 2024-02-09T10:28:11.153483Z INFO Daemon Daemon Configure sshd Feb 9 10:28:11.158276 waagent[1445]: 2024-02-09T10:28:11.158194Z INFO Daemon Daemon Deploy ssh public key. Feb 9 10:28:11.195749 waagent[1445]: 2024-02-09T10:28:11.195620Z INFO Daemon Daemon Decode custom data Feb 9 10:28:11.200508 waagent[1445]: 2024-02-09T10:28:11.200434Z INFO Daemon Daemon Save custom data Feb 9 10:28:12.374970 waagent[1445]: 2024-02-09T10:28:12.374901Z INFO Daemon Daemon Provisioning complete Feb 9 10:28:12.393948 waagent[1445]: 2024-02-09T10:28:12.393881Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 10:28:12.400638 waagent[1445]: 2024-02-09T10:28:12.400562Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 10:28:12.411406 waagent[1445]: 2024-02-09T10:28:12.411327Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 10:28:12.710400 waagent[1503]: 2024-02-09T10:28:12.710310Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 10:28:12.711192 waagent[1503]: 2024-02-09T10:28:12.711127Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:12.711324 waagent[1503]: 2024-02-09T10:28:12.711277Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:12.723432 waagent[1503]: 2024-02-09T10:28:12.723355Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 10:28:12.723630 waagent[1503]: 2024-02-09T10:28:12.723579Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 10:28:12.794135 waagent[1503]: 2024-02-09T10:28:12.794000Z INFO ExtHandler ExtHandler Found private key matching thumbprint C4F3AFD549C484368C42AC45F6DD5AB917593478 Feb 9 10:28:12.794350 waagent[1503]: 2024-02-09T10:28:12.794298Z INFO ExtHandler ExtHandler Certificate with thumbprint 4F8A23A38C6431F8A45AF11FF791A61AACB0A99E has no matching private key. Feb 9 10:28:12.794602 waagent[1503]: 2024-02-09T10:28:12.794550Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 10:28:12.808122 waagent[1503]: 2024-02-09T10:28:12.808066Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 92dccd1a-513b-46da-a891-efb7ed46e51f New eTag: 11787951219580824828] Feb 9 10:28:12.808785 waagent[1503]: 2024-02-09T10:28:12.808724Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 10:28:12.890515 waagent[1503]: 2024-02-09T10:28:12.890346Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:28:12.911967 waagent[1503]: 2024-02-09T10:28:12.911876Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1503 Feb 9 10:28:12.915748 waagent[1503]: 2024-02-09T10:28:12.915680Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:28:12.917129 waagent[1503]: 2024-02-09T10:28:12.917065Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:28:12.995652 waagent[1503]: 2024-02-09T10:28:12.995533Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:28:12.996015 waagent[1503]: 2024-02-09T10:28:12.995956Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:28:13.003613 waagent[1503]: 2024-02-09T10:28:13.003544Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:28:13.004127 waagent[1503]: 2024-02-09T10:28:13.004069Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:28:13.005271 waagent[1503]: 2024-02-09T10:28:13.005206Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 10:28:13.006614 waagent[1503]: 2024-02-09T10:28:13.006544Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:28:13.007248 waagent[1503]: 2024-02-09T10:28:13.007187Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:13.007538 waagent[1503]: 2024-02-09T10:28:13.007480Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:13.008185 waagent[1503]: 2024-02-09T10:28:13.008129Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:28:13.008614 waagent[1503]: 2024-02-09T10:28:13.008556Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:28:13.008614 waagent[1503]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:28:13.008614 waagent[1503]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:28:13.008614 waagent[1503]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:28:13.008614 waagent[1503]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:13.008614 waagent[1503]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:13.008614 waagent[1503]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:13.010896 waagent[1503]: 2024-02-09T10:28:13.010737Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:28:13.011681 waagent[1503]: 2024-02-09T10:28:13.011614Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:13.011957 waagent[1503]: 2024-02-09T10:28:13.011907Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:13.012632 waagent[1503]: 2024-02-09T10:28:13.012572Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:28:13.012867 waagent[1503]: 2024-02-09T10:28:13.012820Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:28:13.013068 waagent[1503]: 2024-02-09T10:28:13.013024Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:28:13.013684 waagent[1503]: 2024-02-09T10:28:13.013612Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:28:13.013772 waagent[1503]: 2024-02-09T10:28:13.013723Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:28:13.014936 waagent[1503]: 2024-02-09T10:28:13.014854Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:28:13.015038 waagent[1503]: 2024-02-09T10:28:13.014972Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:28:13.015665 waagent[1503]: 2024-02-09T10:28:13.015590Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:28:13.025206 waagent[1503]: 2024-02-09T10:28:13.025132Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 10:28:13.026736 waagent[1503]: 2024-02-09T10:28:13.026671Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:28:13.028807 waagent[1503]: 2024-02-09T10:28:13.028694Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 10:28:13.073016 waagent[1503]: 2024-02-09T10:28:13.072954Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 10:28:13.088296 waagent[1503]: 2024-02-09T10:28:13.088199Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1493' Feb 9 10:28:13.148320 waagent[1503]: 2024-02-09T10:28:13.148194Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:28:13.148320 waagent[1503]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:28:13.148320 waagent[1503]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:28:13.148320 waagent[1503]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7b:cc:d2 brd ff:ff:ff:ff:ff:ff Feb 9 10:28:13.148320 waagent[1503]: 3: enP49969s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7b:cc:d2 brd ff:ff:ff:ff:ff:ff\ altname enP49969p0s2 Feb 9 10:28:13.148320 waagent[1503]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:28:13.148320 waagent[1503]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:28:13.148320 waagent[1503]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:28:13.148320 waagent[1503]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:28:13.148320 waagent[1503]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:28:13.148320 waagent[1503]: 2: eth0 inet6 fe80::222:48ff:fe7b:ccd2/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:28:13.264158 waagent[1503]: 2024-02-09T10:28:13.264050Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 10:28:13.414915 waagent[1445]: 2024-02-09T10:28:13.414798Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 10:28:13.418908 waagent[1445]: 2024-02-09T10:28:13.418852Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 10:28:14.564682 waagent[1532]: 2024-02-09T10:28:14.564578Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 10:28:14.565375 waagent[1532]: 2024-02-09T10:28:14.565309Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 10:28:14.565532 waagent[1532]: 2024-02-09T10:28:14.565482Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 10:28:14.573374 waagent[1532]: 2024-02-09T10:28:14.573249Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 10:28:14.573814 waagent[1532]: 2024-02-09T10:28:14.573757Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:14.573965 waagent[1532]: 2024-02-09T10:28:14.573919Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:14.586853 waagent[1532]: 2024-02-09T10:28:14.586778Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 10:28:14.595619 waagent[1532]: 2024-02-09T10:28:14.595558Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 10:28:14.596673 waagent[1532]: 2024-02-09T10:28:14.596614Z INFO ExtHandler Feb 9 10:28:14.596822 waagent[1532]: 2024-02-09T10:28:14.596775Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: f887ca0b-3e2f-4680-be6b-823833d3ff89 eTag: 11787951219580824828 source: Fabric] Feb 9 10:28:14.597587 waagent[1532]: 2024-02-09T10:28:14.597530Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 10:28:14.598807 waagent[1532]: 2024-02-09T10:28:14.598747Z INFO ExtHandler Feb 9 10:28:14.598939 waagent[1532]: 2024-02-09T10:28:14.598893Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 10:28:14.605027 waagent[1532]: 2024-02-09T10:28:14.604979Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 10:28:14.605509 waagent[1532]: 2024-02-09T10:28:14.605458Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 10:28:14.626716 waagent[1532]: 2024-02-09T10:28:14.626658Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 10:28:14.698037 waagent[1532]: 2024-02-09T10:28:14.697898Z INFO ExtHandler Downloaded certificate {'thumbprint': 'C4F3AFD549C484368C42AC45F6DD5AB917593478', 'hasPrivateKey': True} Feb 9 10:28:14.699094 waagent[1532]: 2024-02-09T10:28:14.699033Z INFO ExtHandler Downloaded certificate {'thumbprint': '4F8A23A38C6431F8A45AF11FF791A61AACB0A99E', 'hasPrivateKey': False} Feb 9 10:28:14.700263 waagent[1532]: 2024-02-09T10:28:14.700199Z INFO ExtHandler Fetch goal state completed Feb 9 10:28:14.722299 waagent[1532]: 2024-02-09T10:28:14.722229Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1532 Feb 9 10:28:14.725877 waagent[1532]: 2024-02-09T10:28:14.725816Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 10:28:14.727394 waagent[1532]: 2024-02-09T10:28:14.727336Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 10:28:14.732247 waagent[1532]: 2024-02-09T10:28:14.732184Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 10:28:14.732677 waagent[1532]: 2024-02-09T10:28:14.732619Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 10:28:14.740126 waagent[1532]: 2024-02-09T10:28:14.740057Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 10:28:14.740656 waagent[1532]: 2024-02-09T10:28:14.740599Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 10:28:14.746297 waagent[1532]: 2024-02-09T10:28:14.746185Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 10:28:14.749910 waagent[1532]: 2024-02-09T10:28:14.749849Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 10:28:14.751597 waagent[1532]: 2024-02-09T10:28:14.751523Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 10:28:14.752238 waagent[1532]: 2024-02-09T10:28:14.752178Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:14.752523 waagent[1532]: 2024-02-09T10:28:14.752469Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:14.753190 waagent[1532]: 2024-02-09T10:28:14.753134Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 10:28:14.753597 waagent[1532]: 2024-02-09T10:28:14.753542Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 10:28:14.753597 waagent[1532]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 10:28:14.753597 waagent[1532]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 10:28:14.753597 waagent[1532]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 10:28:14.753597 waagent[1532]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:14.753597 waagent[1532]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:14.753597 waagent[1532]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 10:28:14.756066 waagent[1532]: 2024-02-09T10:28:14.755947Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 10:28:14.758670 waagent[1532]: 2024-02-09T10:28:14.758599Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 10:28:14.759168 waagent[1532]: 2024-02-09T10:28:14.759076Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 10:28:14.759731 waagent[1532]: 2024-02-09T10:28:14.758255Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 10:28:14.760061 waagent[1532]: 2024-02-09T10:28:14.759983Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 10:28:14.760452 waagent[1532]: 2024-02-09T10:28:14.760369Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 10:28:14.760729 waagent[1532]: 2024-02-09T10:28:14.760664Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 10:28:14.761205 waagent[1532]: 2024-02-09T10:28:14.761126Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 10:28:14.763092 waagent[1532]: 2024-02-09T10:28:14.762999Z INFO EnvHandler ExtHandler Configure routes Feb 9 10:28:14.763828 waagent[1532]: 2024-02-09T10:28:14.763762Z INFO EnvHandler ExtHandler Gateway:None Feb 9 10:28:14.763967 waagent[1532]: 2024-02-09T10:28:14.763918Z INFO EnvHandler ExtHandler Routes:None Feb 9 10:28:14.780491 waagent[1532]: 2024-02-09T10:28:14.780392Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 10:28:14.780491 waagent[1532]: Executing ['ip', '-a', '-o', 'link']: Feb 9 10:28:14.780491 waagent[1532]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 10:28:14.780491 waagent[1532]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7b:cc:d2 brd ff:ff:ff:ff:ff:ff Feb 9 10:28:14.780491 waagent[1532]: 3: enP49969s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:7b:cc:d2 brd ff:ff:ff:ff:ff:ff\ altname enP49969p0s2 Feb 9 10:28:14.780491 waagent[1532]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 10:28:14.780491 waagent[1532]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 10:28:14.780491 waagent[1532]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 10:28:14.780491 waagent[1532]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 10:28:14.780491 waagent[1532]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 10:28:14.780491 waagent[1532]: 2: eth0 inet6 fe80::222:48ff:fe7b:ccd2/64 scope link \ valid_lft forever preferred_lft forever Feb 9 10:28:14.786889 waagent[1532]: 2024-02-09T10:28:14.786810Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 10:28:14.787238 waagent[1532]: 2024-02-09T10:28:14.787167Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 10:28:14.810533 waagent[1532]: 2024-02-09T10:28:14.810463Z INFO ExtHandler ExtHandler Feb 9 10:28:14.810702 waagent[1532]: 2024-02-09T10:28:14.810643Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d649b859-49b6-4682-acfc-50fa98c610d0 correlation 7a79cec4-1287-4201-ab67-fac187e807d3 created: 2024-02-09T10:26:48.831024Z] Feb 9 10:28:14.811634 waagent[1532]: 2024-02-09T10:28:14.811563Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 10:28:14.813517 waagent[1532]: 2024-02-09T10:28:14.813460Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 10:28:14.836479 waagent[1532]: 2024-02-09T10:28:14.836348Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 10:28:14.868336 waagent[1532]: 2024-02-09T10:28:14.868259Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: BCDD7CA4-8D77-4B92-82DB-45EAEAE21BB5;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 10:28:14.975499 waagent[1532]: 2024-02-09T10:28:14.975357Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 10:28:14.975499 waagent[1532]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.975499 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.975499 waagent[1532]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.975499 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.975499 waagent[1532]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.975499 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.975499 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:28:14.975499 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:28:14.975499 waagent[1532]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:28:14.982991 waagent[1532]: 2024-02-09T10:28:14.982870Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 10:28:14.982991 waagent[1532]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.982991 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.982991 waagent[1532]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.982991 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.982991 waagent[1532]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 10:28:14.982991 waagent[1532]: pkts bytes target prot opt in out source destination Feb 9 10:28:14.982991 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 10:28:14.982991 waagent[1532]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 10:28:14.982991 waagent[1532]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 10:28:14.983857 waagent[1532]: 2024-02-09T10:28:14.983809Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 10:28:41.504046 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 10:28:48.644575 update_engine[1343]: I0209 10:28:48.644519 1343 update_attempter.cc:509] Updating boot flags... Feb 9 10:28:55.985882 systemd[1]: Created slice system-sshd.slice. Feb 9 10:28:55.987067 systemd[1]: Started sshd@0-10.200.20.13:22-10.200.12.6:56440.service. Feb 9 10:28:56.611725 sshd[1624]: Accepted publickey for core from 10.200.12.6 port 56440 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:28:56.625570 sshd[1624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:56.629354 systemd-logind[1340]: New session 3 of user core. Feb 9 10:28:56.630139 systemd[1]: Started session-3.scope. Feb 9 10:28:56.999459 systemd[1]: Started sshd@1-10.200.20.13:22-10.200.12.6:50840.service. Feb 9 10:28:57.416324 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 50840 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:28:57.417929 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:57.421628 systemd-logind[1340]: New session 4 of user core. Feb 9 10:28:57.422048 systemd[1]: Started session-4.scope. Feb 9 10:28:57.716866 sshd[1629]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:57.719403 systemd[1]: sshd@1-10.200.20.13:22-10.200.12.6:50840.service: Deactivated successfully. Feb 9 10:28:57.720107 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 10:28:57.720656 systemd-logind[1340]: Session 4 logged out. Waiting for processes to exit. Feb 9 10:28:57.721604 systemd-logind[1340]: Removed session 4. Feb 9 10:28:57.787388 systemd[1]: Started sshd@2-10.200.20.13:22-10.200.12.6:50850.service. Feb 9 10:28:58.209662 sshd[1635]: Accepted publickey for core from 10.200.12.6 port 50850 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:28:58.210906 sshd[1635]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:58.214712 systemd-logind[1340]: New session 5 of user core. Feb 9 10:28:58.215121 systemd[1]: Started session-5.scope. Feb 9 10:28:58.511356 sshd[1635]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:58.514069 systemd[1]: sshd@2-10.200.20.13:22-10.200.12.6:50850.service: Deactivated successfully. Feb 9 10:28:58.514731 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 10:28:58.515254 systemd-logind[1340]: Session 5 logged out. Waiting for processes to exit. Feb 9 10:28:58.516103 systemd-logind[1340]: Removed session 5. Feb 9 10:28:58.580060 systemd[1]: Started sshd@3-10.200.20.13:22-10.200.12.6:50854.service. Feb 9 10:28:58.993931 sshd[1641]: Accepted publickey for core from 10.200.12.6 port 50854 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:28:58.995212 sshd[1641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:58.999156 systemd-logind[1340]: New session 6 of user core. Feb 9 10:28:58.999635 systemd[1]: Started session-6.scope. Feb 9 10:28:59.295259 sshd[1641]: pam_unix(sshd:session): session closed for user core Feb 9 10:28:59.298046 systemd[1]: sshd@3-10.200.20.13:22-10.200.12.6:50854.service: Deactivated successfully. Feb 9 10:28:59.298734 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 10:28:59.299270 systemd-logind[1340]: Session 6 logged out. Waiting for processes to exit. Feb 9 10:28:59.300067 systemd-logind[1340]: Removed session 6. Feb 9 10:28:59.364131 systemd[1]: Started sshd@4-10.200.20.13:22-10.200.12.6:50858.service. Feb 9 10:28:59.777566 sshd[1647]: Accepted publickey for core from 10.200.12.6 port 50858 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:28:59.779149 sshd[1647]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:28:59.783303 systemd[1]: Started session-7.scope. Feb 9 10:28:59.783870 systemd-logind[1340]: New session 7 of user core. Feb 9 10:29:00.242072 sudo[1650]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 10:29:00.242275 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:29:00.281613 dbus-daemon[1325]: avc: received setenforce notice (enforcing=1) Feb 9 10:29:00.283474 sudo[1650]: pam_unix(sudo:session): session closed for user root Feb 9 10:29:00.370672 sshd[1647]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:00.373411 systemd[1]: sshd@4-10.200.20.13:22-10.200.12.6:50858.service: Deactivated successfully. Feb 9 10:29:00.374224 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 10:29:00.374773 systemd-logind[1340]: Session 7 logged out. Waiting for processes to exit. Feb 9 10:29:00.375584 systemd-logind[1340]: Removed session 7. Feb 9 10:29:00.439046 systemd[1]: Started sshd@5-10.200.20.13:22-10.200.12.6:50872.service. Feb 9 10:29:00.853344 sshd[1654]: Accepted publickey for core from 10.200.12.6 port 50872 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:00.854695 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:00.858421 systemd-logind[1340]: New session 8 of user core. Feb 9 10:29:00.858832 systemd[1]: Started session-8.scope. Feb 9 10:29:01.089104 sudo[1658]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 10:29:01.089300 sudo[1658]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:29:01.091825 sudo[1658]: pam_unix(sudo:session): session closed for user root Feb 9 10:29:01.095872 sudo[1657]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 10:29:01.096289 sudo[1657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:29:01.104244 systemd[1]: Stopping audit-rules.service... Feb 9 10:29:01.104000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:29:01.104000 audit[1661]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffece3f940 a2=420 a3=0 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:01.116273 auditctl[1661]: No rules Feb 9 10:29:01.140005 kernel: audit: type=1305 audit(1707474541.104:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 10:29:01.140091 kernel: audit: type=1300 audit(1707474541.104:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffece3f940 a2=420 a3=0 items=0 ppid=1 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:01.140299 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 10:29:01.140505 systemd[1]: Stopped audit-rules.service. Feb 9 10:29:01.104000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:29:01.148214 kernel: audit: type=1327 audit(1707474541.104:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 10:29:01.142124 systemd[1]: Starting audit-rules.service... Feb 9 10:29:01.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.165449 kernel: audit: type=1131 audit(1707474541.140:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.173168 augenrules[1678]: No rules Feb 9 10:29:01.174006 systemd[1]: Finished audit-rules.service. Feb 9 10:29:01.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.177022 sudo[1657]: pam_unix(sudo:session): session closed for user root Feb 9 10:29:01.176000 audit[1657]: USER_END pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.208987 kernel: audit: type=1130 audit(1707474541.173:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.209073 kernel: audit: type=1106 audit(1707474541.176:168): pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.209100 kernel: audit: type=1104 audit(1707474541.176:169): pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.176000 audit[1657]: CRED_DISP pid=1657 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.254632 sshd[1654]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:01.255000 audit[1654]: USER_END pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.279569 systemd[1]: sshd@5-10.200.20.13:22-10.200.12.6:50872.service: Deactivated successfully. Feb 9 10:29:01.255000 audit[1654]: CRED_DISP pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.298318 kernel: audit: type=1106 audit(1707474541.255:170): pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.298390 kernel: audit: type=1104 audit(1707474541.255:171): pid=1654 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.280276 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 10:29:01.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.299061 systemd-logind[1340]: Session 8 logged out. Waiting for processes to exit. Feb 9 10:29:01.317615 kernel: audit: type=1131 audit(1707474541.279:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.318171 systemd-logind[1340]: Removed session 8. Feb 9 10:29:01.329218 systemd[1]: Started sshd@6-10.200.20.13:22-10.200.12.6:50888.service. Feb 9 10:29:01.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:01.774000 audit[1684]: USER_ACCT pid=1684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.776505 sshd[1684]: Accepted publickey for core from 10.200.12.6 port 50888 ssh2: RSA SHA256:S9lva1Unirvt66RVkZ3LomA1rXSJmXocNKSg/xqHW1E Feb 9 10:29:01.776000 audit[1684]: CRED_ACQ pid=1684 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.776000 audit[1684]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0ad8e60 a2=3 a3=1 items=0 ppid=1 pid=1684 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:01.776000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 10:29:01.778085 sshd[1684]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 10:29:01.782036 systemd[1]: Started session-9.scope. Feb 9 10:29:01.783323 systemd-logind[1340]: New session 9 of user core. Feb 9 10:29:01.785000 audit[1684]: USER_START pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:01.786000 audit[1686]: CRED_ACQ pid=1686 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:02.028000 audit[1687]: USER_ACCT pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.030132 sudo[1687]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 10:29:02.028000 audit[1687]: CRED_REFR pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.030341 sudo[1687]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 10:29:02.030000 audit[1687]: USER_START pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:02.765038 systemd[1]: Reloading. Feb 9 10:29:02.832166 /usr/lib/systemd/system-generators/torcx-generator[1717]: time="2024-02-09T10:29:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:29:02.833079 /usr/lib/systemd/system-generators/torcx-generator[1717]: time="2024-02-09T10:29:02Z" level=info msg="torcx already run" Feb 9 10:29:02.906541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:29:02.906817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:29:02.922118 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit: BPF prog-id=32 op=LOAD Feb 9 10:29:02.990000 audit: BPF prog-id=26 op=UNLOAD Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit: BPF prog-id=33 op=LOAD Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.991000 audit: BPF prog-id=34 op=LOAD Feb 9 10:29:02.991000 audit: BPF prog-id=27 op=UNLOAD Feb 9 10:29:02.991000 audit: BPF prog-id=28 op=UNLOAD Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit: BPF prog-id=35 op=LOAD Feb 9 10:29:02.992000 audit: BPF prog-id=21 op=UNLOAD Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit: BPF prog-id=36 op=LOAD Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit: BPF prog-id=37 op=LOAD Feb 9 10:29:02.993000 audit: BPF prog-id=22 op=UNLOAD Feb 9 10:29:02.993000 audit: BPF prog-id=23 op=UNLOAD Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.993000 audit: BPF prog-id=38 op=LOAD Feb 9 10:29:02.993000 audit: BPF prog-id=25 op=UNLOAD Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit: BPF prog-id=39 op=LOAD Feb 9 10:29:02.995000 audit: BPF prog-id=15 op=UNLOAD Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit: BPF prog-id=40 op=LOAD Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.995000 audit: BPF prog-id=41 op=LOAD Feb 9 10:29:02.995000 audit: BPF prog-id=16 op=UNLOAD Feb 9 10:29:02.995000 audit: BPF prog-id=17 op=UNLOAD Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.996000 audit: BPF prog-id=42 op=LOAD Feb 9 10:29:02.996000 audit: BPF prog-id=24 op=UNLOAD Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit: BPF prog-id=43 op=LOAD Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit: BPF prog-id=44 op=LOAD Feb 9 10:29:02.997000 audit: BPF prog-id=18 op=UNLOAD Feb 9 10:29:02.997000 audit: BPF prog-id=19 op=UNLOAD Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.997000 audit: BPF prog-id=45 op=LOAD Feb 9 10:29:02.997000 audit: BPF prog-id=29 op=UNLOAD Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:02.998000 audit: BPF prog-id=46 op=LOAD Feb 9 10:29:02.998000 audit: BPF prog-id=31 op=UNLOAD Feb 9 10:29:03.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:03.017845 systemd[1]: Started kubelet.service. Feb 9 10:29:03.065135 kubelet[1775]: E0209 10:29:03.065063 1775 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 10:29:03.075734 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 10:29:03.075868 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 10:29:03.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 10:29:03.077677 systemd[1]: Starting coreos-metadata.service... Feb 9 10:29:03.115124 coreos-metadata[1783]: Feb 09 10:29:03.115 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 10:29:03.117573 coreos-metadata[1783]: Feb 09 10:29:03.117 INFO Fetch successful Feb 9 10:29:03.117800 coreos-metadata[1783]: Feb 09 10:29:03.117 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 10:29:03.119419 coreos-metadata[1783]: Feb 09 10:29:03.119 INFO Fetch successful Feb 9 10:29:03.119834 coreos-metadata[1783]: Feb 09 10:29:03.119 INFO Fetching http://168.63.129.16/machine/8fdc2577-cff3-4f5d-86e3-85490095e02a/21921240%2Dcffa%2D44bb%2D8f11%2Dc5aff63b1fc8.%5Fci%2D3510.3.2%2Da%2Df964c266ce?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 10:29:03.121419 coreos-metadata[1783]: Feb 09 10:29:03.121 INFO Fetch successful Feb 9 10:29:03.154264 coreos-metadata[1783]: Feb 09 10:29:03.154 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 10:29:03.166901 coreos-metadata[1783]: Feb 09 10:29:03.166 INFO Fetch successful Feb 9 10:29:03.175028 systemd[1]: Finished coreos-metadata.service. Feb 9 10:29:03.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:06.076400 systemd[1]: Stopped kubelet.service. Feb 9 10:29:06.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:06.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:06.095256 systemd[1]: Reloading. Feb 9 10:29:06.143985 /usr/lib/systemd/system-generators/torcx-generator[1839]: time="2024-02-09T10:29:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 10:29:06.144018 /usr/lib/systemd/system-generators/torcx-generator[1839]: time="2024-02-09T10:29:06Z" level=info msg="torcx already run" Feb 9 10:29:06.225133 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 10:29:06.225153 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 10:29:06.240220 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 10:29:06.327930 kernel: kauditd_printk_skb: 188 callbacks suppressed Feb 9 10:29:06.328050 kernel: audit: type=1400 audit(1707474546.307:359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344773 kernel: audit: type=1400 audit(1707474546.307:360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.359784 kernel: audit: type=1400 audit(1707474546.307:361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.375658 kernel: audit: type=1400 audit(1707474546.307:362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.375724 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.397675 kernel: audit: type=1400 audit(1707474546.307:363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.397793 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.420208 kernel: audit: type=1400 audit(1707474546.307:364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.420305 kernel: audit: backlog limit exceeded Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.442634 kernel: audit: type=1400 audit(1707474546.307:365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit: BPF prog-id=47 op=LOAD Feb 9 10:29:06.312000 audit: BPF prog-id=32 op=UNLOAD Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.312000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit: BPF prog-id=48 op=LOAD Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.327000 audit: BPF prog-id=49 op=LOAD Feb 9 10:29:06.327000 audit: BPF prog-id=33 op=UNLOAD Feb 9 10:29:06.327000 audit: BPF prog-id=34 op=UNLOAD Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit: BPF prog-id=50 op=LOAD Feb 9 10:29:06.344000 audit: BPF prog-id=35 op=UNLOAD Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit: BPF prog-id=51 op=LOAD Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.359000 audit: BPF prog-id=52 op=LOAD Feb 9 10:29:06.359000 audit: BPF prog-id=36 op=UNLOAD Feb 9 10:29:06.359000 audit: BPF prog-id=37 op=UNLOAD Feb 9 10:29:06.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.442000 audit: BPF prog-id=53 op=LOAD Feb 9 10:29:06.442000 audit: BPF prog-id=38 op=UNLOAD Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit: BPF prog-id=54 op=LOAD Feb 9 10:29:06.444000 audit: BPF prog-id=39 op=UNLOAD Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit: BPF prog-id=55 op=LOAD Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit: BPF prog-id=56 op=LOAD Feb 9 10:29:06.445000 audit: BPF prog-id=40 op=UNLOAD Feb 9 10:29:06.445000 audit: BPF prog-id=41 op=UNLOAD Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.445000 audit: BPF prog-id=57 op=LOAD Feb 9 10:29:06.445000 audit: BPF prog-id=42 op=UNLOAD Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit: BPF prog-id=58 op=LOAD Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit: BPF prog-id=59 op=LOAD Feb 9 10:29:06.446000 audit: BPF prog-id=43 op=UNLOAD Feb 9 10:29:06.446000 audit: BPF prog-id=44 op=UNLOAD Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.446000 audit: BPF prog-id=60 op=LOAD Feb 9 10:29:06.446000 audit: BPF prog-id=45 op=UNLOAD Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.447000 audit: BPF prog-id=61 op=LOAD Feb 9 10:29:06.447000 audit: BPF prog-id=46 op=UNLOAD Feb 9 10:29:06.466886 systemd[1]: Started kubelet.service. Feb 9 10:29:06.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:06.510634 kubelet[1898]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:29:06.510938 kubelet[1898]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:06.511091 kubelet[1898]: I0209 10:29:06.511061 1898 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 10:29:06.513574 kubelet[1898]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 10:29:06.513574 kubelet[1898]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 10:29:06.823541 kubelet[1898]: I0209 10:29:06.823508 1898 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 10:29:06.823541 kubelet[1898]: I0209 10:29:06.823535 1898 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 10:29:06.823750 kubelet[1898]: I0209 10:29:06.823732 1898 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 10:29:06.827296 kubelet[1898]: I0209 10:29:06.827269 1898 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 10:29:06.827471 kubelet[1898]: W0209 10:29:06.827370 1898 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 10:29:06.828001 kubelet[1898]: I0209 10:29:06.827965 1898 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 10:29:06.828212 kubelet[1898]: I0209 10:29:06.828199 1898 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 10:29:06.828278 kubelet[1898]: I0209 10:29:06.828264 1898 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 10:29:06.828371 kubelet[1898]: I0209 10:29:06.828280 1898 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 10:29:06.828371 kubelet[1898]: I0209 10:29:06.828291 1898 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 10:29:06.828419 kubelet[1898]: I0209 10:29:06.828384 1898 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:06.831417 kubelet[1898]: I0209 10:29:06.831397 1898 kubelet.go:398] "Attempting to sync node with API server" Feb 9 10:29:06.831478 kubelet[1898]: I0209 10:29:06.831433 1898 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 10:29:06.831478 kubelet[1898]: I0209 10:29:06.831456 1898 kubelet.go:297] "Adding apiserver pod source" Feb 9 10:29:06.831478 kubelet[1898]: I0209 10:29:06.831467 1898 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 10:29:06.832032 kubelet[1898]: E0209 10:29:06.832010 1898 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:06.832075 kubelet[1898]: E0209 10:29:06.832063 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:06.832629 kubelet[1898]: I0209 10:29:06.832612 1898 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 10:29:06.832885 kubelet[1898]: W0209 10:29:06.832867 1898 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 10:29:06.833288 kubelet[1898]: I0209 10:29:06.833267 1898 server.go:1186] "Started kubelet" Feb 9 10:29:06.835074 kubelet[1898]: E0209 10:29:06.835051 1898 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 10:29:06.833000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.833000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:06.833000 audit[1898]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e75470 a1=4000efa2e8 a2=4000e75440 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.833000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:06.835362 kubelet[1898]: E0209 10:29:06.835348 1898 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 10:29:06.835458 kubelet[1898]: I0209 10:29:06.835142 1898 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 10:29:06.834000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.834000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:06.834000 audit[1898]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dbc160 a1=4000c8e408 a2=4000c51950 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.834000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:06.835754 kubelet[1898]: I0209 10:29:06.835741 1898 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 10:29:06.835878 kubelet[1898]: I0209 10:29:06.835867 1898 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 10:29:06.836364 kubelet[1898]: I0209 10:29:06.835171 1898 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 10:29:06.836937 kubelet[1898]: I0209 10:29:06.836907 1898 server.go:451] "Adding debug handlers to kubelet server" Feb 9 10:29:06.836000 audit[1908]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1908 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.836000 audit[1908]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffccf02480 a2=0 a3=1 items=0 ppid=1898 pid=1908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.836000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:29:06.838768 kubelet[1898]: I0209 10:29:06.838753 1898 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 10:29:06.838000 audit[1909]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.838000 audit[1909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffeae364d0 a2=0 a3=1 items=0 ppid=1898 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.838000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:29:06.840212 kubelet[1898]: I0209 10:29:06.840195 1898 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 10:29:06.840000 audit[1911]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.840000 audit[1911]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc7987050 a2=0 a3=1 items=0 ppid=1898 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.840000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:06.842000 audit[1913]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.842000 audit[1913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd775a3a0 a2=0 a3=1 items=0 ppid=1898 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.842000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 10:29:06.852564 kubelet[1898]: E0209 10:29:06.852529 1898 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:06.853058 kubelet[1898]: W0209 10:29:06.853038 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:06.853158 kubelet[1898]: E0209 10:29:06.853146 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:06.853245 kubelet[1898]: W0209 10:29:06.853233 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:06.853316 kubelet[1898]: E0209 10:29:06.853307 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:06.853397 kubelet[1898]: W0209 10:29:06.853386 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:06.853492 kubelet[1898]: E0209 10:29:06.853482 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:06.854194 kubelet[1898]: E0209 10:29:06.854062 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc3045028", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 833248296, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 833248296, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.864794 kubelet[1898]: E0209 10:29:06.864710 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc3242a12", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 835335698, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 835335698, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.870030 kubelet[1898]: E0209 10:29:06.869939 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.870256 kubelet[1898]: I0209 10:29:06.870240 1898 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 10:29:06.870322 kubelet[1898]: I0209 10:29:06.870312 1898 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 10:29:06.870376 kubelet[1898]: I0209 10:29:06.870369 1898 state_mem.go:36] "Initialized new in-memory state store" Feb 9 10:29:06.871440 kubelet[1898]: E0209 10:29:06.871355 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.872011 kubelet[1898]: E0209 10:29:06.871955 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.879632 kubelet[1898]: I0209 10:29:06.879610 1898 policy_none.go:49] "None policy: Start" Feb 9 10:29:06.880280 kubelet[1898]: I0209 10:29:06.880266 1898 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 10:29:06.880369 kubelet[1898]: I0209 10:29:06.880360 1898 state_mem.go:35] "Initializing new in-memory state store" Feb 9 10:29:06.888221 systemd[1]: Created slice kubepods.slice. Feb 9 10:29:06.892277 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 10:29:06.895257 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 10:29:06.905339 kubelet[1898]: I0209 10:29:06.905305 1898 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 10:29:06.904000 audit[1898]: AVC avc: denied { mac_admin } for pid=1898 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:06.904000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 10:29:06.904000 audit[1898]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000610000 a1=400060e048 a2=400111df80 a3=25 items=0 ppid=1 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.904000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 10:29:06.906759 kubelet[1898]: I0209 10:29:06.906690 1898 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 10:29:06.907362 kubelet[1898]: I0209 10:29:06.907351 1898 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 10:29:06.908077 kubelet[1898]: E0209 10:29:06.908062 1898 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.13\" not found" Feb 9 10:29:06.908374 kubelet[1898]: E0209 10:29:06.908301 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc7639872", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 906601586, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 906601586, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.911000 audit[1920]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.911000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc5eb5c70 a2=0 a3=1 items=0 ppid=1898 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 10:29:06.912000 audit[1921]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.912000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffccca0cb0 a2=0 a3=1 items=0 ppid=1898 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.912000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:29:06.939972 kubelet[1898]: I0209 10:29:06.939949 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:06.941211 kubelet[1898]: E0209 10:29:06.941189 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:06.941597 kubelet[1898]: E0209 10:29:06.941525 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 939893207, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.942530 kubelet[1898]: E0209 10:29:06.942479 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 939904681, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.943346 kubelet[1898]: E0209 10:29:06.943290 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 939907839, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:06.988000 audit[1925]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_rule pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:06.988000 audit[1925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff30feef0 a2=0 a3=1 items=0 ppid=1898 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:06.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:29:07.018000 audit[1928]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.018000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffe1a16a90 a2=0 a3=1 items=0 ppid=1898 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.018000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:29:07.019000 audit[1929]: NETFILTER_CFG table=nat:13 family=2 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.019000 audit[1929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffeb58d40 a2=0 a3=1 items=0 ppid=1898 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:29:07.020000 audit[1930]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.020000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf7e67f0 a2=0 a3=1 items=0 ppid=1898 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:29:07.022000 audit[1932]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.022000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcd0690d0 a2=0 a3=1 items=0 ppid=1898 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.022000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:29:07.053981 kubelet[1898]: E0209 10:29:07.053953 1898 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:07.024000 audit[1934]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.024000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff9f01e20 a2=0 a3=1 items=0 ppid=1898 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.024000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:29:07.106000 audit[1937]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.106000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff9848c80 a2=0 a3=1 items=0 ppid=1898 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:29:07.108000 audit[1939]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.108000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff43a4350 a2=0 a3=1 items=0 ppid=1898 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:29:07.142591 kubelet[1898]: I0209 10:29:07.142553 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:07.144207 kubelet[1898]: E0209 10:29:07.144187 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:07.144300 kubelet[1898]: E0209 10:29:07.144186 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 142514145, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.143000 audit[1942]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.143000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffe64dfc80 a2=0 a3=1 items=0 ppid=1898 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.145220 kubelet[1898]: E0209 10:29:07.145153 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 142518942, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:29:07.145730 kubelet[1898]: I0209 10:29:07.145711 1898 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 10:29:07.145000 audit[1943]: NETFILTER_CFG table=mangle:20 family=10 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.145000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdb2925c0 a2=0 a3=1 items=0 ppid=1898 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 10:29:07.145000 audit[1944]: NETFILTER_CFG table=mangle:21 family=2 entries=1 op=nft_register_chain pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.145000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca5ae3a0 a2=0 a3=1 items=0 ppid=1898 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:29:07.146000 audit[1945]: NETFILTER_CFG table=nat:22 family=10 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.146000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffec400790 a2=0 a3=1 items=0 ppid=1898 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 10:29:07.147000 audit[1946]: NETFILTER_CFG table=nat:23 family=2 entries=1 op=nft_register_chain pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.147000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffce897370 a2=0 a3=1 items=0 ppid=1898 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.147000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:29:07.148000 audit[1948]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:07.148000 audit[1948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd846fb10 a2=0 a3=1 items=0 ppid=1898 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.148000 audit[1949]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.148000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffca14c4c0 a2=0 a3=1 items=0 ppid=1898 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 10:29:07.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:29:07.149000 audit[1950]: NETFILTER_CFG table=filter:26 family=10 entries=2 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.149000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffde931b60 a2=0 a3=1 items=0 ppid=1898 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 10:29:07.151000 audit[1952]: NETFILTER_CFG table=filter:27 family=10 entries=1 op=nft_register_rule pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.151000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcb69f800 a2=0 a3=1 items=0 ppid=1898 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 10:29:07.152000 audit[1953]: NETFILTER_CFG table=nat:28 family=10 entries=1 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.152000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc2aadfe0 a2=0 a3=1 items=0 ppid=1898 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.152000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 10:29:07.153000 audit[1954]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.153000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9b6ac50 a2=0 a3=1 items=0 ppid=1898 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 10:29:07.155000 audit[1956]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.155000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc2217640 a2=0 a3=1 items=0 ppid=1898 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 10:29:07.156000 audit[1958]: NETFILTER_CFG table=nat:31 family=10 entries=2 op=nft_register_chain pid=1958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.156000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffb072f20 a2=0 a3=1 items=0 ppid=1898 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 10:29:07.158000 audit[1960]: NETFILTER_CFG table=nat:32 family=10 entries=1 op=nft_register_rule pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.158000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffff3a811f0 a2=0 a3=1 items=0 ppid=1898 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 10:29:07.160000 audit[1962]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=1962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.160000 audit[1962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffdd4531f0 a2=0 a3=1 items=0 ppid=1898 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 10:29:07.217000 audit[1964]: NETFILTER_CFG table=nat:34 family=10 entries=1 op=nft_register_rule pid=1964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.217000 audit[1964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffe0a85d70 a2=0 a3=1 items=0 ppid=1898 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 10:29:07.219172 kubelet[1898]: I0209 10:29:07.219149 1898 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 10:29:07.219172 kubelet[1898]: I0209 10:29:07.219174 1898 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 10:29:07.219270 kubelet[1898]: I0209 10:29:07.219191 1898 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 10:29:07.219270 kubelet[1898]: E0209 10:29:07.219229 1898 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 10:29:07.219000 audit[1965]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.220589 kubelet[1898]: W0209 10:29:07.220565 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:07.220635 kubelet[1898]: E0209 10:29:07.220594 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:07.219000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff8b35540 a2=0 a3=1 items=0 ppid=1898 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 10:29:07.220000 audit[1966]: NETFILTER_CFG table=nat:36 family=10 entries=1 op=nft_register_chain pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.220000 audit[1966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8ff43d0 a2=0 a3=1 items=0 ppid=1898 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 10:29:07.221000 audit[1967]: NETFILTER_CFG table=filter:37 family=10 entries=1 op=nft_register_chain pid=1967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:07.221000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff137f640 a2=0 a3=1 items=0 ppid=1898 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:07.221000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 10:29:07.234635 kubelet[1898]: E0209 10:29:07.234555 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 142524379, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.455883 kubelet[1898]: E0209 10:29:07.455845 1898 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:07.545718 kubelet[1898]: I0209 10:29:07.545690 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:07.546973 kubelet[1898]: E0209 10:29:07.546902 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 545654442, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.547162 kubelet[1898]: E0209 10:29:07.547145 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:07.635359 kubelet[1898]: E0209 10:29:07.635282 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 545661359, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.833044 kubelet[1898]: E0209 10:29:07.832951 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:07.834993 kubelet[1898]: E0209 10:29:07.834902 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 7, 545664317, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:07.842882 kubelet[1898]: W0209 10:29:07.842863 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:07.842945 kubelet[1898]: E0209 10:29:07.842889 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:08.257068 kubelet[1898]: E0209 10:29:08.257035 1898 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:08.348241 kubelet[1898]: I0209 10:29:08.348225 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:08.349490 kubelet[1898]: E0209 10:29:08.349469 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:08.349582 kubelet[1898]: E0209 10:29:08.349456 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 8, 348187762, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:08.350437 kubelet[1898]: E0209 10:29:08.350364 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 8, 348200395, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:08.366217 kubelet[1898]: W0209 10:29:08.366197 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:08.366342 kubelet[1898]: E0209 10:29:08.366332 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:08.379055 kubelet[1898]: W0209 10:29:08.379038 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:08.379142 kubelet[1898]: E0209 10:29:08.379132 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:08.435193 kubelet[1898]: E0209 10:29:08.435119 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 8, 348202914, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:08.618765 kubelet[1898]: W0209 10:29:08.618660 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:08.619341 kubelet[1898]: E0209 10:29:08.619326 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:08.833456 kubelet[1898]: E0209 10:29:08.833416 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:09.768583 kubelet[1898]: W0209 10:29:09.768545 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:09.768583 kubelet[1898]: E0209 10:29:09.768579 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:09.833752 kubelet[1898]: E0209 10:29:09.833725 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:09.858600 kubelet[1898]: E0209 10:29:09.858577 1898 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:09.950599 kubelet[1898]: I0209 10:29:09.950579 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:09.951732 kubelet[1898]: E0209 10:29:09.951610 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 9, 950538810, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:09.951974 kubelet[1898]: E0209 10:29:09.951957 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:09.952404 kubelet[1898]: E0209 10:29:09.952338 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 9, 950543368, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:09.953134 kubelet[1898]: E0209 10:29:09.953070 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 9, 950546127, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:09.978064 kubelet[1898]: W0209 10:29:09.978040 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:09.978214 kubelet[1898]: E0209 10:29:09.978204 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:10.771560 kubelet[1898]: W0209 10:29:10.771531 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:10.771904 kubelet[1898]: E0209 10:29:10.771889 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:10.834780 kubelet[1898]: E0209 10:29:10.834754 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:10.848790 kubelet[1898]: W0209 10:29:10.848770 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:10.848905 kubelet[1898]: E0209 10:29:10.848894 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:11.834865 kubelet[1898]: E0209 10:29:11.834831 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:12.836247 kubelet[1898]: E0209 10:29:12.836216 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:13.060338 kubelet[1898]: E0209 10:29:13.060304 1898 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.20.13" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 10:29:13.153569 kubelet[1898]: I0209 10:29:13.153260 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:13.154323 kubelet[1898]: E0209 10:29:13.154245 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52717d4", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.13 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869082068, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 13, 153225554, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52717d4" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:13.154598 kubelet[1898]: E0209 10:29:13.154579 1898 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.13" Feb 9 10:29:13.155035 kubelet[1898]: E0209 10:29:13.154983 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc52728da", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.13 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869086426, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 13, 153231671, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc52728da" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:13.155684 kubelet[1898]: E0209 10:29:13.155625 1898 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13.17b22b0dc5273580", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.13", UID:"10.200.20.13", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.13 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.13"}, FirstTimestamp:time.Date(2024, time.February, 9, 10, 29, 6, 869089664, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 10, 29, 13, 153234750, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.13.17b22b0dc5273580" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 10:29:13.836812 kubelet[1898]: E0209 10:29:13.836761 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:14.437755 kubelet[1898]: W0209 10:29:14.437723 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:14.437755 kubelet[1898]: E0209 10:29:14.437756 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.13" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 10:29:14.656487 kubelet[1898]: W0209 10:29:14.656449 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:14.656487 kubelet[1898]: E0209 10:29:14.656480 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 10:29:14.838010 kubelet[1898]: E0209 10:29:14.837656 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:15.839176 kubelet[1898]: E0209 10:29:15.839137 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:15.846250 kubelet[1898]: W0209 10:29:15.846227 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:15.846291 kubelet[1898]: E0209 10:29:15.846258 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 10:29:16.169190 kubelet[1898]: W0209 10:29:16.169167 1898 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:16.169335 kubelet[1898]: E0209 10:29:16.169325 1898 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 10:29:16.827500 kubelet[1898]: I0209 10:29:16.827465 1898 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 10:29:16.839877 kubelet[1898]: E0209 10:29:16.839851 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:16.908741 kubelet[1898]: E0209 10:29:16.908718 1898 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.13\" not found" Feb 9 10:29:17.210189 kubelet[1898]: E0209 10:29:17.210162 1898 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.13" not found Feb 9 10:29:17.840584 kubelet[1898]: E0209 10:29:17.840536 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:18.255281 kubelet[1898]: E0209 10:29:18.255215 1898 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.13" not found Feb 9 10:29:18.840719 kubelet[1898]: E0209 10:29:18.840689 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:19.463850 kubelet[1898]: E0209 10:29:19.463818 1898 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.13\" not found" node="10.200.20.13" Feb 9 10:29:19.556291 kubelet[1898]: I0209 10:29:19.556262 1898 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.13" Feb 9 10:29:19.656928 kubelet[1898]: I0209 10:29:19.656903 1898 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.13" Feb 9 10:29:19.688235 kubelet[1898]: E0209 10:29:19.688199 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:19.788846 kubelet[1898]: E0209 10:29:19.788486 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:19.840841 kubelet[1898]: E0209 10:29:19.840823 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:19.888877 kubelet[1898]: E0209 10:29:19.888840 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:19.981000 audit[1687]: USER_END pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:19.982404 sudo[1687]: pam_unix(sudo:session): session closed for user root Feb 9 10:29:19.987482 kernel: kauditd_printk_skb: 284 callbacks suppressed Feb 9 10:29:19.987521 kernel: audit: type=1106 audit(1707474559.981:563): pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:19.989807 kubelet[1898]: E0209 10:29:19.989784 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:19.984000 audit[1687]: CRED_DISP pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.028151 kernel: audit: type=1104 audit(1707474559.984:564): pid=1687 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.057644 sshd[1684]: pam_unix(sshd:session): session closed for user core Feb 9 10:29:20.057000 audit[1684]: USER_END pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.060512 systemd[1]: sshd@6-10.200.20.13:22-10.200.12.6:50888.service: Deactivated successfully. Feb 9 10:29:20.089238 kernel: audit: type=1106 audit(1707474560.057:565): pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.089293 kernel: audit: type=1104 audit(1707474560.057:566): pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.057000 audit[1684]: CRED_DISP pid=1684 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 10:29:20.088584 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 10:29:20.088993 systemd-logind[1340]: Session 9 logged out. Waiting for processes to exit. Feb 9 10:29:20.090792 kubelet[1898]: E0209 10:29:20.090773 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.130873 kernel: audit: type=1131 audit(1707474560.058:567): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 10:29:20.131282 systemd-logind[1340]: Removed session 9. Feb 9 10:29:20.191434 kubelet[1898]: E0209 10:29:20.191386 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.292393 kubelet[1898]: E0209 10:29:20.292365 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.392908 kubelet[1898]: E0209 10:29:20.392789 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.493098 kubelet[1898]: E0209 10:29:20.493055 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.593324 kubelet[1898]: E0209 10:29:20.593304 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.693601 kubelet[1898]: E0209 10:29:20.693580 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.793916 kubelet[1898]: E0209 10:29:20.793892 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.841544 kubelet[1898]: E0209 10:29:20.841513 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:20.894178 kubelet[1898]: E0209 10:29:20.894145 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:20.994969 kubelet[1898]: E0209 10:29:20.994575 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.095481 kubelet[1898]: E0209 10:29:21.095450 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.195803 kubelet[1898]: E0209 10:29:21.195768 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.296670 kubelet[1898]: E0209 10:29:21.296286 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.397867 kubelet[1898]: E0209 10:29:21.397835 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.498480 kubelet[1898]: E0209 10:29:21.498420 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.599453 kubelet[1898]: E0209 10:29:21.599023 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.699363 kubelet[1898]: E0209 10:29:21.699340 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.799886 kubelet[1898]: E0209 10:29:21.799707 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:21.842201 kubelet[1898]: E0209 10:29:21.842179 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:21.900779 kubelet[1898]: E0209 10:29:21.900374 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.001656 kubelet[1898]: E0209 10:29:22.001618 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.102042 kubelet[1898]: E0209 10:29:22.102020 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.202465 kubelet[1898]: E0209 10:29:22.202445 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.302968 kubelet[1898]: E0209 10:29:22.302930 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.403001 kubelet[1898]: E0209 10:29:22.402970 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.503847 kubelet[1898]: E0209 10:29:22.503475 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.603841 kubelet[1898]: E0209 10:29:22.603815 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.704222 kubelet[1898]: E0209 10:29:22.704194 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.804855 kubelet[1898]: E0209 10:29:22.804548 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:22.842991 kubelet[1898]: E0209 10:29:22.842973 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:22.905189 kubelet[1898]: E0209 10:29:22.905171 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.005689 kubelet[1898]: E0209 10:29:23.005666 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.107168 kubelet[1898]: E0209 10:29:23.106720 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.207150 kubelet[1898]: E0209 10:29:23.207120 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.307384 kubelet[1898]: E0209 10:29:23.307352 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.407939 kubelet[1898]: E0209 10:29:23.407919 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.508288 kubelet[1898]: E0209 10:29:23.508268 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.608584 kubelet[1898]: E0209 10:29:23.608562 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.709236 kubelet[1898]: E0209 10:29:23.708917 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.809785 kubelet[1898]: E0209 10:29:23.809750 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:23.844279 kubelet[1898]: E0209 10:29:23.844250 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:23.909940 kubelet[1898]: E0209 10:29:23.909907 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.010846 kubelet[1898]: E0209 10:29:24.010405 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.110792 kubelet[1898]: E0209 10:29:24.110763 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.211148 kubelet[1898]: E0209 10:29:24.211121 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.311794 kubelet[1898]: E0209 10:29:24.311418 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.411975 kubelet[1898]: E0209 10:29:24.411944 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.512343 kubelet[1898]: E0209 10:29:24.512322 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.613070 kubelet[1898]: E0209 10:29:24.612704 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.713098 kubelet[1898]: E0209 10:29:24.713068 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.813468 kubelet[1898]: E0209 10:29:24.813448 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:24.844997 kubelet[1898]: E0209 10:29:24.844980 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:24.913941 kubelet[1898]: E0209 10:29:24.913910 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.014509 kubelet[1898]: E0209 10:29:25.014476 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.114910 kubelet[1898]: E0209 10:29:25.114881 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.215577 kubelet[1898]: E0209 10:29:25.215263 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.315766 kubelet[1898]: E0209 10:29:25.315732 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.416229 kubelet[1898]: E0209 10:29:25.416212 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.516868 kubelet[1898]: E0209 10:29:25.516573 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.617434 kubelet[1898]: E0209 10:29:25.617396 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.717758 kubelet[1898]: E0209 10:29:25.717741 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.818463 kubelet[1898]: E0209 10:29:25.818075 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:25.845682 kubelet[1898]: E0209 10:29:25.845656 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:25.918894 kubelet[1898]: E0209 10:29:25.918868 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.019282 kubelet[1898]: E0209 10:29:26.019253 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.119983 kubelet[1898]: E0209 10:29:26.119551 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.219941 kubelet[1898]: E0209 10:29:26.219918 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.320713 kubelet[1898]: E0209 10:29:26.320689 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.421420 kubelet[1898]: E0209 10:29:26.421401 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.522146 kubelet[1898]: E0209 10:29:26.522110 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.622484 kubelet[1898]: E0209 10:29:26.622464 1898 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.13\" not found" Feb 9 10:29:26.723627 kubelet[1898]: I0209 10:29:26.723275 1898 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 10:29:26.724118 env[1352]: time="2024-02-09T10:29:26.724034679Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 10:29:26.724369 kubelet[1898]: I0209 10:29:26.724285 1898 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 10:29:26.832558 kubelet[1898]: E0209 10:29:26.832530 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:26.843857 kubelet[1898]: I0209 10:29:26.843839 1898 apiserver.go:52] "Watching apiserver" Feb 9 10:29:26.846048 kubelet[1898]: E0209 10:29:26.846026 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:26.846329 kubelet[1898]: I0209 10:29:26.846046 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:29:26.846463 kubelet[1898]: I0209 10:29:26.846450 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:29:26.846603 kubelet[1898]: I0209 10:29:26.846589 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:29:26.846791 kubelet[1898]: E0209 10:29:26.846777 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:26.851526 systemd[1]: Created slice kubepods-besteffort-pod9fbff7f1_d155_4713_9a93_f42d7fae9ea3.slice. Feb 9 10:29:26.866199 systemd[1]: Created slice kubepods-besteffort-pod8bbf1595_71d6_4583_a5a4_4e90cd2d7963.slice. Feb 9 10:29:26.941177 kubelet[1898]: I0209 10:29:26.941147 1898 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 10:29:27.023471 kubelet[1898]: I0209 10:29:27.022857 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-policysync\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023471 kubelet[1898]: I0209 10:29:27.022903 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-node-certs\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023471 kubelet[1898]: I0209 10:29:27.022926 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-cni-net-dir\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023471 kubelet[1898]: I0209 10:29:27.022947 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-flexvol-driver-host\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023471 kubelet[1898]: I0209 10:29:27.022969 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9fbff7f1-d155-4713-9a93-f42d7fae9ea3-kube-proxy\") pod \"kube-proxy-td8wm\" (UID: \"9fbff7f1-d155-4713-9a93-f42d7fae9ea3\") " pod="kube-system/kube-proxy-td8wm" Feb 9 10:29:27.023646 kubelet[1898]: I0209 10:29:27.022988 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9fbff7f1-d155-4713-9a93-f42d7fae9ea3-xtables-lock\") pod \"kube-proxy-td8wm\" (UID: \"9fbff7f1-d155-4713-9a93-f42d7fae9ea3\") " pod="kube-system/kube-proxy-td8wm" Feb 9 10:29:27.023646 kubelet[1898]: I0209 10:29:27.023008 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-cni-bin-dir\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023646 kubelet[1898]: I0209 10:29:27.023030 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-cni-log-dir\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023646 kubelet[1898]: I0209 10:29:27.023052 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/d032e776-5142-4805-b328-e933689118b3-kubelet-dir\") pod \"csi-node-driver-th2zs\" (UID: \"d032e776-5142-4805-b328-e933689118b3\") " pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:27.023646 kubelet[1898]: I0209 10:29:27.023072 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/d032e776-5142-4805-b328-e933689118b3-socket-dir\") pod \"csi-node-driver-th2zs\" (UID: \"d032e776-5142-4805-b328-e933689118b3\") " pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:27.023747 kubelet[1898]: I0209 10:29:27.023090 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9fbff7f1-d155-4713-9a93-f42d7fae9ea3-lib-modules\") pod \"kube-proxy-td8wm\" (UID: \"9fbff7f1-d155-4713-9a93-f42d7fae9ea3\") " pod="kube-system/kube-proxy-td8wm" Feb 9 10:29:27.023747 kubelet[1898]: I0209 10:29:27.023111 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xr49s\" (UniqueName: \"kubernetes.io/projected/9fbff7f1-d155-4713-9a93-f42d7fae9ea3-kube-api-access-xr49s\") pod \"kube-proxy-td8wm\" (UID: \"9fbff7f1-d155-4713-9a93-f42d7fae9ea3\") " pod="kube-system/kube-proxy-td8wm" Feb 9 10:29:27.023747 kubelet[1898]: I0209 10:29:27.023131 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hlzf4\" (UniqueName: \"kubernetes.io/projected/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-kube-api-access-hlzf4\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023747 kubelet[1898]: I0209 10:29:27.023151 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b4lh4\" (UniqueName: \"kubernetes.io/projected/d032e776-5142-4805-b328-e933689118b3-kube-api-access-b4lh4\") pod \"csi-node-driver-th2zs\" (UID: \"d032e776-5142-4805-b328-e933689118b3\") " pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:27.023747 kubelet[1898]: I0209 10:29:27.023175 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-xtables-lock\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023854 kubelet[1898]: I0209 10:29:27.023195 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-var-run-calico\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023854 kubelet[1898]: I0209 10:29:27.023214 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-var-lib-calico\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023854 kubelet[1898]: I0209 10:29:27.023240 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/d032e776-5142-4805-b328-e933689118b3-varrun\") pod \"csi-node-driver-th2zs\" (UID: \"d032e776-5142-4805-b328-e933689118b3\") " pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:27.023854 kubelet[1898]: I0209 10:29:27.023263 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/d032e776-5142-4805-b328-e933689118b3-registration-dir\") pod \"csi-node-driver-th2zs\" (UID: \"d032e776-5142-4805-b328-e933689118b3\") " pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:27.023854 kubelet[1898]: I0209 10:29:27.023294 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-lib-modules\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023955 kubelet[1898]: I0209 10:29:27.023314 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8bbf1595-71d6-4583-a5a4-4e90cd2d7963-tigera-ca-bundle\") pod \"calico-node-299vr\" (UID: \"8bbf1595-71d6-4583-a5a4-4e90cd2d7963\") " pod="calico-system/calico-node-299vr" Feb 9 10:29:27.023955 kubelet[1898]: I0209 10:29:27.023321 1898 reconciler.go:41] "Reconciler: start to sync state" Feb 9 10:29:27.125630 kubelet[1898]: E0209 10:29:27.125594 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.125630 kubelet[1898]: W0209 10:29:27.125618 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.125750 kubelet[1898]: E0209 10:29:27.125640 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.125797 kubelet[1898]: E0209 10:29:27.125785 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.125797 kubelet[1898]: W0209 10:29:27.125793 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.125840 kubelet[1898]: E0209 10:29:27.125803 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.125931 kubelet[1898]: E0209 10:29:27.125909 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.125931 kubelet[1898]: W0209 10:29:27.125923 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.125983 kubelet[1898]: E0209 10:29:27.125933 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.126094 kubelet[1898]: E0209 10:29:27.126076 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.126094 kubelet[1898]: W0209 10:29:27.126089 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.126152 kubelet[1898]: E0209 10:29:27.126099 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.131922 kubelet[1898]: E0209 10:29:27.131906 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.132032 kubelet[1898]: W0209 10:29:27.132020 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.132115 kubelet[1898]: E0209 10:29:27.132105 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.225388 kubelet[1898]: E0209 10:29:27.225366 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.225539 kubelet[1898]: W0209 10:29:27.225525 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.225618 kubelet[1898]: E0209 10:29:27.225608 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.225813 kubelet[1898]: E0209 10:29:27.225803 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.225879 kubelet[1898]: W0209 10:29:27.225868 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.225942 kubelet[1898]: E0209 10:29:27.225933 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.226130 kubelet[1898]: E0209 10:29:27.226120 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.226192 kubelet[1898]: W0209 10:29:27.226182 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.226243 kubelet[1898]: E0209 10:29:27.226235 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327333 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.328464 kubelet[1898]: W0209 10:29:27.327354 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327372 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327542 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.328464 kubelet[1898]: W0209 10:29:27.327550 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327561 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327701 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.328464 kubelet[1898]: W0209 10:29:27.327707 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.328464 kubelet[1898]: E0209 10:29:27.327716 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.428313 kubelet[1898]: E0209 10:29:27.428289 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.428476 kubelet[1898]: W0209 10:29:27.428460 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.428538 kubelet[1898]: E0209 10:29:27.428528 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.428736 kubelet[1898]: E0209 10:29:27.428725 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.428804 kubelet[1898]: W0209 10:29:27.428793 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.428854 kubelet[1898]: E0209 10:29:27.428846 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.429079 kubelet[1898]: E0209 10:29:27.429068 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.429152 kubelet[1898]: W0209 10:29:27.429141 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.429207 kubelet[1898]: E0209 10:29:27.429199 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.468193 kubelet[1898]: E0209 10:29:27.468174 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.468316 kubelet[1898]: W0209 10:29:27.468303 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.468375 kubelet[1898]: E0209 10:29:27.468365 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.529667 kubelet[1898]: E0209 10:29:27.529645 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.529789 kubelet[1898]: W0209 10:29:27.529773 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.529846 kubelet[1898]: E0209 10:29:27.529837 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.530036 kubelet[1898]: E0209 10:29:27.530026 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.530100 kubelet[1898]: W0209 10:29:27.530089 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.530155 kubelet[1898]: E0209 10:29:27.530145 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.633516 kubelet[1898]: E0209 10:29:27.630617 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.633516 kubelet[1898]: W0209 10:29:27.630636 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.633516 kubelet[1898]: E0209 10:29:27.630654 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.633516 kubelet[1898]: E0209 10:29:27.630806 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.633516 kubelet[1898]: W0209 10:29:27.630815 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.633516 kubelet[1898]: E0209 10:29:27.630825 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.667934 kubelet[1898]: E0209 10:29:27.667909 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.668083 kubelet[1898]: W0209 10:29:27.668067 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.668146 kubelet[1898]: E0209 10:29:27.668136 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.731373 kubelet[1898]: E0209 10:29:27.731346 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.731524 kubelet[1898]: W0209 10:29:27.731509 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.731618 kubelet[1898]: E0209 10:29:27.731608 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.765245 env[1352]: time="2024-02-09T10:29:27.765189362Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-td8wm,Uid:9fbff7f1-d155-4713-9a93-f42d7fae9ea3,Namespace:kube-system,Attempt:0,}" Feb 9 10:29:27.832726 kubelet[1898]: E0209 10:29:27.832698 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.832860 kubelet[1898]: W0209 10:29:27.832846 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.832929 kubelet[1898]: E0209 10:29:27.832920 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:27.846941 kubelet[1898]: E0209 10:29:27.846919 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:27.867834 kubelet[1898]: E0209 10:29:27.867812 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:27.867977 kubelet[1898]: W0209 10:29:27.867962 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:27.868049 kubelet[1898]: E0209 10:29:27.868039 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:28.071370 env[1352]: time="2024-02-09T10:29:28.071315475Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-299vr,Uid:8bbf1595-71d6-4583-a5a4-4e90cd2d7963,Namespace:calico-system,Attempt:0,}" Feb 9 10:29:28.220459 kubelet[1898]: E0209 10:29:28.220331 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:28.848137 kubelet[1898]: E0209 10:29:28.848101 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:28.893947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2740173850.mount: Deactivated successfully. Feb 9 10:29:28.916108 env[1352]: time="2024-02-09T10:29:28.916050601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.929113 env[1352]: time="2024-02-09T10:29:28.929059872Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.932654 env[1352]: time="2024-02-09T10:29:28.932611206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.940768 env[1352]: time="2024-02-09T10:29:28.940726720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.950980 env[1352]: time="2024-02-09T10:29:28.950933743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.953681 env[1352]: time="2024-02-09T10:29:28.953646818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.960665 env[1352]: time="2024-02-09T10:29:28.960630284Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:28.968493 env[1352]: time="2024-02-09T10:29:28.968458847Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:29.007107 env[1352]: time="2024-02-09T10:29:29.007040480Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:29.007290 env[1352]: time="2024-02-09T10:29:29.007267091Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:29.007395 env[1352]: time="2024-02-09T10:29:29.007372539Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:29.008396 env[1352]: time="2024-02-09T10:29:29.007623903Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/36b5733f37b14f18547e3f29cc3af54e46f59d5723545e9f5da24dfc63da5814 pid=2003 runtime=io.containerd.runc.v2 Feb 9 10:29:29.027325 systemd[1]: Started cri-containerd-36b5733f37b14f18547e3f29cc3af54e46f59d5723545e9f5da24dfc63da5814.scope. Feb 9 10:29:29.030141 env[1352]: time="2024-02-09T10:29:29.030076482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:29.030317 env[1352]: time="2024-02-09T10:29:29.030294496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:29.030417 env[1352]: time="2024-02-09T10:29:29.030395825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:29.033141 env[1352]: time="2024-02-09T10:29:29.030727124Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2 pid=2031 runtime=io.containerd.runc.v2 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077828 kernel: audit: type=1400 audit(1707474569.040:568): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077960 kernel: audit: type=1400 audit(1707474569.040:569): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.095337 kernel: audit: type=1400 audit(1707474569.040:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.113077 kernel: audit: type=1400 audit(1707474569.040:571): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.131758 kernel: audit: type=1400 audit(1707474569.040:572): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.149876 kernel: audit: type=1400 audit(1707474569.040:573): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.170654 kernel: audit: type=1400 audit(1707474569.040:574): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.172048 systemd[1]: Started cri-containerd-181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2.scope. Feb 9 10:29:29.188830 kernel: audit: type=1400 audit(1707474569.040:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.207163 kernel: audit: type=1400 audit(1707474569.040:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.210036 kernel: audit: type=1400 audit(1707474569.060:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.211711 env[1352]: time="2024-02-09T10:29:29.211671319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-td8wm,Uid:9fbff7f1-d155-4713-9a93-f42d7fae9ea3,Namespace:kube-system,Attempt:0,} returns sandbox id \"36b5733f37b14f18547e3f29cc3af54e46f59d5723545e9f5da24dfc63da5814\"" Feb 9 10:29:29.213780 env[1352]: time="2024-02-09T10:29:29.213750448Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 10:29:29.227665 kubelet[1898]: E0209 10:29:29.227150 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:29.060000 audit: BPF prog-id=62 op=LOAD Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2003 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623537333366333762313466313835343765336632396363336166 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2003 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623537333366333762313466313835343765336632396363336166 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit: BPF prog-id=63 op=LOAD Feb 9 10:29:29.076000 audit[2013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2003 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623537333366333762313466313835343765336632396363336166 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.076000 audit: BPF prog-id=64 op=LOAD Feb 9 10:29:29.076000 audit[2013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2003 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623537333366333762313466313835343765336632396363336166 Feb 9 10:29:29.077000 audit: BPF prog-id=64 op=UNLOAD Feb 9 10:29:29.077000 audit: BPF prog-id=63 op=UNLOAD Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { perfmon } for pid=2013 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit[2013]: AVC avc: denied { bpf } for pid=2013 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.077000 audit: BPF prog-id=65 op=LOAD Feb 9 10:29:29.077000 audit[2013]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2003 pid=2013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336623537333366333762313466313835343765336632396363336166 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.225000 audit: BPF prog-id=66 op=LOAD Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2031 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138316338363931393034623039343063666130336361336237663561 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2031 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138316338363931393034623039343063666130336361336237663561 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit: BPF prog-id=67 op=LOAD Feb 9 10:29:29.226000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2031 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138316338363931393034623039343063666130336361336237663561 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.226000 audit: BPF prog-id=68 op=LOAD Feb 9 10:29:29.226000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2031 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138316338363931393034623039343063666130336361336237663561 Feb 9 10:29:29.227000 audit: BPF prog-id=68 op=UNLOAD Feb 9 10:29:29.227000 audit: BPF prog-id=67 op=UNLOAD Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:29.227000 audit: BPF prog-id=69 op=LOAD Feb 9 10:29:29.227000 audit[2051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2031 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:29.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138316338363931393034623039343063666130336361336237663561 Feb 9 10:29:29.241230 env[1352]: time="2024-02-09T10:29:29.241171038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-299vr,Uid:8bbf1595-71d6-4583-a5a4-4e90cd2d7963,Namespace:calico-system,Attempt:0,} returns sandbox id \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\"" Feb 9 10:29:29.848791 kubelet[1898]: E0209 10:29:29.848755 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:30.406669 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1099921433.mount: Deactivated successfully. Feb 9 10:29:30.849665 kubelet[1898]: E0209 10:29:30.849557 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:30.884572 env[1352]: time="2024-02-09T10:29:30.884528666Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:30.893476 env[1352]: time="2024-02-09T10:29:30.893405354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:30.898782 env[1352]: time="2024-02-09T10:29:30.898748609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:30.903219 env[1352]: time="2024-02-09T10:29:30.903189133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:30.903775 env[1352]: time="2024-02-09T10:29:30.903747647Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 10:29:30.905375 env[1352]: time="2024-02-09T10:29:30.905342774Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 10:29:30.906357 env[1352]: time="2024-02-09T10:29:30.906321684Z" level=info msg="CreateContainer within sandbox \"36b5733f37b14f18547e3f29cc3af54e46f59d5723545e9f5da24dfc63da5814\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 10:29:30.932325 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1729168553.mount: Deactivated successfully. Feb 9 10:29:30.935166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2470210211.mount: Deactivated successfully. Feb 9 10:29:30.949787 env[1352]: time="2024-02-09T10:29:30.949740051Z" level=info msg="CreateContainer within sandbox \"36b5733f37b14f18547e3f29cc3af54e46f59d5723545e9f5da24dfc63da5814\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7945c4b66af34186f90d079e37bdcc9fe6b44285efc893c15422aec789a17d11\"" Feb 9 10:29:30.950831 env[1352]: time="2024-02-09T10:29:30.950793299Z" level=info msg="StartContainer for \"7945c4b66af34186f90d079e37bdcc9fe6b44285efc893c15422aec789a17d11\"" Feb 9 10:29:30.968315 systemd[1]: Started cri-containerd-7945c4b66af34186f90d079e37bdcc9fe6b44285efc893c15422aec789a17d11.scope. Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2003 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343563346236366166333431383666393064303739653337626463 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.983000 audit: BPF prog-id=70 op=LOAD Feb 9 10:29:30.983000 audit[2088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2003 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343563346236366166333431383666393064303739653337626463 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.984000 audit: BPF prog-id=71 op=LOAD Feb 9 10:29:30.984000 audit[2088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2003 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343563346236366166333431383666393064303739653337626463 Feb 9 10:29:30.984000 audit: BPF prog-id=71 op=UNLOAD Feb 9 10:29:30.984000 audit: BPF prog-id=70 op=UNLOAD Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { perfmon } for pid=2088 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit[2088]: AVC avc: denied { bpf } for pid=2088 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:30.985000 audit: BPF prog-id=72 op=LOAD Feb 9 10:29:30.985000 audit[2088]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2003 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:30.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739343563346236366166333431383666393064303739653337626463 Feb 9 10:29:31.008732 env[1352]: time="2024-02-09T10:29:31.008680074Z" level=info msg="StartContainer for \"7945c4b66af34186f90d079e37bdcc9fe6b44285efc893c15422aec789a17d11\" returns successfully" Feb 9 10:29:31.044000 audit[2136]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.044000 audit[2136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffadb3a40 a2=0 a3=ffff823a76c0 items=0 ppid=2098 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:29:31.044000 audit[2137]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.044000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdb0e5a80 a2=0 a3=ffff8e1d86c0 items=0 ppid=2098 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.044000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 10:29:31.046000 audit[2138]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.046000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff20aecf0 a2=0 a3=ffff9edc06c0 items=0 ppid=2098 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:29:31.047000 audit[2139]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2139 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.047000 audit[2139]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc55b030 a2=0 a3=ffffb06896c0 items=0 ppid=2098 pid=2139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 10:29:31.048000 audit[2140]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.048000 audit[2140]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3a385e0 a2=0 a3=ffffba17d6c0 items=0 ppid=2098 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:29:31.049000 audit[2141]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.049000 audit[2141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe79f9d70 a2=0 a3=ffffbba5a6c0 items=0 ppid=2098 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 10:29:31.144000 audit[2142]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.144000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc9769f40 a2=0 a3=ffffada566c0 items=0 ppid=2098 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:29:31.148000 audit[2144]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2144 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.148000 audit[2144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe7874960 a2=0 a3=ffff8cbe26c0 items=0 ppid=2098 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 10:29:31.151000 audit[2147]: NETFILTER_CFG table=filter:46 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.151000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0036ff0 a2=0 a3=ffffbef0e6c0 items=0 ppid=2098 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 10:29:31.152000 audit[2148]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.152000 audit[2148]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8a0d210 a2=0 a3=ffffab5c46c0 items=0 ppid=2098 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:29:31.154000 audit[2150]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.154000 audit[2150]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffe74b300 a2=0 a3=ffffa9e566c0 items=0 ppid=2098 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:29:31.155000 audit[2151]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.155000 audit[2151]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff231fc60 a2=0 a3=ffffaf9636c0 items=0 ppid=2098 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:29:31.157000 audit[2153]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.157000 audit[2153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe3f6e270 a2=0 a3=ffffb79196c0 items=0 ppid=2098 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:29:31.160000 audit[2156]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.160000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc4d10840 a2=0 a3=ffff89fd96c0 items=0 ppid=2098 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 10:29:31.161000 audit[2157]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.161000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7719b90 a2=0 a3=ffff816796c0 items=0 ppid=2098 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:29:31.164000 audit[2159]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.164000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7c344a0 a2=0 a3=ffffbe02b6c0 items=0 ppid=2098 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:29:31.165000 audit[2160]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.165000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1734070 a2=0 a3=ffff7f7fc6c0 items=0 ppid=2098 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:29:31.167000 audit[2162]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2162 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.167000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffddbd6160 a2=0 a3=ffff82e716c0 items=0 ppid=2098 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.170000 audit[2165]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.170000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe140dbe0 a2=0 a3=ffff801c56c0 items=0 ppid=2098 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.174000 audit[2168]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.174000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc48b7840 a2=0 a3=ffff84f186c0 items=0 ppid=2098 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:29:31.175000 audit[2169]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.175000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcde81380 a2=0 a3=ffff91e9a6c0 items=0 ppid=2098 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:29:31.177000 audit[2171]: NETFILTER_CFG table=nat:59 family=2 entries=2 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.177000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd2ac34a0 a2=0 a3=ffffaa8d26c0 items=0 ppid=2098 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.177000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.180000 audit[2174]: NETFILTER_CFG table=nat:60 family=2 entries=2 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 10:29:31.180000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd8a01050 a2=0 a3=ffff7f8816c0 items=0 ppid=2098 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.184000 audit[2178]: NETFILTER_CFG table=filter:61 family=2 entries=3 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:31.184000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffec48a2f0 a2=0 a3=ffffb8eb76c0 items=0 ppid=2098 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.184000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.219927 kubelet[1898]: E0209 10:29:31.219535 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:31.273960 kubelet[1898]: E0209 10:29:31.273931 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.273960 kubelet[1898]: W0209 10:29:31.273954 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274112 kubelet[1898]: E0209 10:29:31.273976 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274140 kubelet[1898]: E0209 10:29:31.274122 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274140 kubelet[1898]: W0209 10:29:31.274129 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274140 kubelet[1898]: E0209 10:29:31.274140 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274276 kubelet[1898]: E0209 10:29:31.274261 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274276 kubelet[1898]: W0209 10:29:31.274273 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274351 kubelet[1898]: E0209 10:29:31.274284 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274485 kubelet[1898]: E0209 10:29:31.274468 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274485 kubelet[1898]: W0209 10:29:31.274482 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274549 kubelet[1898]: E0209 10:29:31.274494 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274637 kubelet[1898]: E0209 10:29:31.274622 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274637 kubelet[1898]: W0209 10:29:31.274634 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274701 kubelet[1898]: E0209 10:29:31.274645 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274775 kubelet[1898]: E0209 10:29:31.274760 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274775 kubelet[1898]: W0209 10:29:31.274773 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.274844 kubelet[1898]: E0209 10:29:31.274783 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.274944 kubelet[1898]: E0209 10:29:31.274928 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.274944 kubelet[1898]: W0209 10:29:31.274942 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275019 kubelet[1898]: E0209 10:29:31.274952 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275082 kubelet[1898]: E0209 10:29:31.275068 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275082 kubelet[1898]: W0209 10:29:31.275080 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275153 kubelet[1898]: E0209 10:29:31.275091 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275225 kubelet[1898]: E0209 10:29:31.275211 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275225 kubelet[1898]: W0209 10:29:31.275223 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275347 kubelet[1898]: E0209 10:29:31.275233 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275409 kubelet[1898]: E0209 10:29:31.275390 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275409 kubelet[1898]: W0209 10:29:31.275404 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275503 kubelet[1898]: E0209 10:29:31.275415 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275563 kubelet[1898]: E0209 10:29:31.275545 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275563 kubelet[1898]: W0209 10:29:31.275558 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275627 kubelet[1898]: E0209 10:29:31.275567 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275702 kubelet[1898]: E0209 10:29:31.275688 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275702 kubelet[1898]: W0209 10:29:31.275700 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275771 kubelet[1898]: E0209 10:29:31.275710 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275849 kubelet[1898]: E0209 10:29:31.275834 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275849 kubelet[1898]: W0209 10:29:31.275846 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.275917 kubelet[1898]: E0209 10:29:31.275859 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.275986 kubelet[1898]: E0209 10:29:31.275973 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.275986 kubelet[1898]: W0209 10:29:31.275983 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.276057 kubelet[1898]: E0209 10:29:31.275993 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.276123 kubelet[1898]: E0209 10:29:31.276108 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.276123 kubelet[1898]: W0209 10:29:31.276121 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.276193 kubelet[1898]: E0209 10:29:31.276131 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.276257 kubelet[1898]: E0209 10:29:31.276242 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.276257 kubelet[1898]: W0209 10:29:31.276255 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.276314 kubelet[1898]: E0209 10:29:31.276264 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.301000 audit[2178]: NETFILTER_CFG table=nat:62 family=2 entries=68 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:31.301000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffec48a2f0 a2=0 a3=ffffb8eb76c0 items=0 ppid=2098 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.327000 audit[2201]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.327000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc474e0a0 a2=0 a3=ffffb89496c0 items=0 ppid=2098 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 10:29:31.330000 audit[2203]: NETFILTER_CFG table=filter:64 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.330000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd3207260 a2=0 a3=ffff8d9096c0 items=0 ppid=2098 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 10:29:31.333000 audit[2206]: NETFILTER_CFG table=filter:65 family=10 entries=2 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.333000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe24765f0 a2=0 a3=ffffbb3c86c0 items=0 ppid=2098 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 10:29:31.334000 audit[2207]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.334000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0c8b780 a2=0 a3=ffff93d2b6c0 items=0 ppid=2098 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 10:29:31.337000 audit[2209]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.337000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdc5b3200 a2=0 a3=ffff9132a6c0 items=0 ppid=2098 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 10:29:31.338000 audit[2210]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.338000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcc6dfa0 a2=0 a3=ffff8fdaf6c0 items=0 ppid=2098 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 10:29:31.340000 audit[2212]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.340000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd0f84e0 a2=0 a3=ffff9459a6c0 items=0 ppid=2098 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 10:29:31.343000 audit[2215]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.343000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe56f34a0 a2=0 a3=ffffa810b6c0 items=0 ppid=2098 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.343000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 10:29:31.344000 audit[2216]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.344000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2750560 a2=0 a3=ffffb759f6c0 items=0 ppid=2098 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 10:29:31.346000 audit[2218]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.346000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe5613e40 a2=0 a3=ffffab44b6c0 items=0 ppid=2098 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 10:29:31.347000 audit[2219]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.347000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff469f5f0 a2=0 a3=ffff80c436c0 items=0 ppid=2098 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.347000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 10:29:31.349000 audit[2221]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.349000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd88d8220 a2=0 a3=ffffbebd56c0 items=0 ppid=2098 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 10:29:31.352000 audit[2224]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.352000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe3840510 a2=0 a3=ffffa38826c0 items=0 ppid=2098 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 10:29:31.354178 kubelet[1898]: E0209 10:29:31.354141 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.354178 kubelet[1898]: W0209 10:29:31.354160 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.354303 kubelet[1898]: E0209 10:29:31.354188 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.354544 kubelet[1898]: E0209 10:29:31.354526 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.354544 kubelet[1898]: W0209 10:29:31.354539 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.354634 kubelet[1898]: E0209 10:29:31.354560 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.354751 kubelet[1898]: E0209 10:29:31.354735 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.354751 kubelet[1898]: W0209 10:29:31.354747 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.354815 kubelet[1898]: E0209 10:29:31.354762 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.354923 kubelet[1898]: E0209 10:29:31.354901 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.354923 kubelet[1898]: W0209 10:29:31.354913 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.354923 kubelet[1898]: E0209 10:29:31.354923 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.355069 kubelet[1898]: E0209 10:29:31.355043 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.355069 kubelet[1898]: W0209 10:29:31.355062 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.355069 kubelet[1898]: E0209 10:29:31.355077 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.355235 kubelet[1898]: E0209 10:29:31.355211 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.355235 kubelet[1898]: W0209 10:29:31.355228 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.355295 kubelet[1898]: E0209 10:29:31.355238 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.355536 kubelet[1898]: E0209 10:29:31.355520 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.355622 kubelet[1898]: W0209 10:29:31.355608 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.355695 kubelet[1898]: E0209 10:29:31.355685 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.355912 kubelet[1898]: E0209 10:29:31.355873 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.355912 kubelet[1898]: W0209 10:29:31.355886 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.355912 kubelet[1898]: E0209 10:29:31.355904 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.356066 kubelet[1898]: E0209 10:29:31.356052 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.356066 kubelet[1898]: W0209 10:29:31.356064 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.356174 kubelet[1898]: E0209 10:29:31.356075 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.356198 kubelet[1898]: E0209 10:29:31.356180 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.356198 kubelet[1898]: W0209 10:29:31.356187 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.356244 kubelet[1898]: E0209 10:29:31.356204 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.356354 kubelet[1898]: E0209 10:29:31.356331 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.356354 kubelet[1898]: W0209 10:29:31.356350 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.356418 kubelet[1898]: E0209 10:29:31.356360 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.356725 kubelet[1898]: E0209 10:29:31.356701 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:31.356725 kubelet[1898]: W0209 10:29:31.356713 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:31.356725 kubelet[1898]: E0209 10:29:31.356724 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:31.357000 audit[2239]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.357000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffee92d90 a2=0 a3=ffffbc2b36c0 items=0 ppid=2098 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 10:29:31.358000 audit[2240]: NETFILTER_CFG table=nat:77 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.358000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe7388d90 a2=0 a3=ffff96a896c0 items=0 ppid=2098 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 10:29:31.360000 audit[2242]: NETFILTER_CFG table=nat:78 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.360000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd75fe600 a2=0 a3=ffffa2bee6c0 items=0 ppid=2098 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.360000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.363000 audit[2245]: NETFILTER_CFG table=nat:79 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 10:29:31.363000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffef9e7e70 a2=0 a3=ffff88aac6c0 items=0 ppid=2098 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.363000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 10:29:31.367000 audit[2249]: NETFILTER_CFG table=filter:80 family=10 entries=3 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:29:31.367000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffeb32d990 a2=0 a3=ffffbef446c0 items=0 ppid=2098 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.367000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.367000 audit[2249]: NETFILTER_CFG table=nat:81 family=10 entries=10 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 10:29:31.367000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffeb32d990 a2=0 a3=ffffbef446c0 items=0 ppid=2098 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:31.367000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:31.850043 kubelet[1898]: E0209 10:29:31.850012 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:32.243043 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2193165011.mount: Deactivated successfully. Feb 9 10:29:32.281652 kubelet[1898]: E0209 10:29:32.281591 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.281652 kubelet[1898]: W0209 10:29:32.281623 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.281652 kubelet[1898]: E0209 10:29:32.281643 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.281832 kubelet[1898]: E0209 10:29:32.281773 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.281832 kubelet[1898]: W0209 10:29:32.281780 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.281832 kubelet[1898]: E0209 10:29:32.281790 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.281932 kubelet[1898]: E0209 10:29:32.281911 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.281932 kubelet[1898]: W0209 10:29:32.281926 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.281988 kubelet[1898]: E0209 10:29:32.281937 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282129 kubelet[1898]: E0209 10:29:32.282112 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282129 kubelet[1898]: W0209 10:29:32.282124 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282192 kubelet[1898]: E0209 10:29:32.282135 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282264 kubelet[1898]: E0209 10:29:32.282249 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282264 kubelet[1898]: W0209 10:29:32.282261 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282322 kubelet[1898]: E0209 10:29:32.282273 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282400 kubelet[1898]: E0209 10:29:32.282385 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282400 kubelet[1898]: W0209 10:29:32.282398 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282467 kubelet[1898]: E0209 10:29:32.282407 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282605 kubelet[1898]: E0209 10:29:32.282589 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282605 kubelet[1898]: W0209 10:29:32.282603 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282668 kubelet[1898]: E0209 10:29:32.282614 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282745 kubelet[1898]: E0209 10:29:32.282729 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282745 kubelet[1898]: W0209 10:29:32.282742 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282793 kubelet[1898]: E0209 10:29:32.282752 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.282884 kubelet[1898]: E0209 10:29:32.282870 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.282907 kubelet[1898]: W0209 10:29:32.282883 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.282907 kubelet[1898]: E0209 10:29:32.282893 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283110 kubelet[1898]: E0209 10:29:32.283094 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283110 kubelet[1898]: W0209 10:29:32.283105 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283176 kubelet[1898]: E0209 10:29:32.283116 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283255 kubelet[1898]: E0209 10:29:32.283235 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283255 kubelet[1898]: W0209 10:29:32.283247 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283320 kubelet[1898]: E0209 10:29:32.283258 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283395 kubelet[1898]: E0209 10:29:32.283374 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283395 kubelet[1898]: W0209 10:29:32.283387 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283465 kubelet[1898]: E0209 10:29:32.283398 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283557 kubelet[1898]: E0209 10:29:32.283540 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283557 kubelet[1898]: W0209 10:29:32.283554 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283610 kubelet[1898]: E0209 10:29:32.283564 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283692 kubelet[1898]: E0209 10:29:32.283677 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283692 kubelet[1898]: W0209 10:29:32.283689 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283743 kubelet[1898]: E0209 10:29:32.283699 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283820 kubelet[1898]: E0209 10:29:32.283805 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283820 kubelet[1898]: W0209 10:29:32.283818 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283874 kubelet[1898]: E0209 10:29:32.283828 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.283946 kubelet[1898]: E0209 10:29:32.283931 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.283973 kubelet[1898]: W0209 10:29:32.283945 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.283973 kubelet[1898]: E0209 10:29:32.283955 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.359486 kubelet[1898]: E0209 10:29:32.359449 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.359486 kubelet[1898]: W0209 10:29:32.359473 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.359486 kubelet[1898]: E0209 10:29:32.359493 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.359695 kubelet[1898]: E0209 10:29:32.359649 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.359695 kubelet[1898]: W0209 10:29:32.359658 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.359695 kubelet[1898]: E0209 10:29:32.359668 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.359832 kubelet[1898]: E0209 10:29:32.359816 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.359832 kubelet[1898]: W0209 10:29:32.359829 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.359902 kubelet[1898]: E0209 10:29:32.359843 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.359990 kubelet[1898]: E0209 10:29:32.359973 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.359990 kubelet[1898]: W0209 10:29:32.359985 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.360046 kubelet[1898]: E0209 10:29:32.359997 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.360124 kubelet[1898]: E0209 10:29:32.360108 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.360124 kubelet[1898]: W0209 10:29:32.360119 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.360189 kubelet[1898]: E0209 10:29:32.360134 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.360288 kubelet[1898]: E0209 10:29:32.360267 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.360288 kubelet[1898]: W0209 10:29:32.360278 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.360288 kubelet[1898]: E0209 10:29:32.360288 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.360667 kubelet[1898]: E0209 10:29:32.360552 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.360667 kubelet[1898]: W0209 10:29:32.360565 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.360667 kubelet[1898]: E0209 10:29:32.360588 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.360931 kubelet[1898]: E0209 10:29:32.360831 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.360931 kubelet[1898]: W0209 10:29:32.360844 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.360931 kubelet[1898]: E0209 10:29:32.360865 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.361200 kubelet[1898]: E0209 10:29:32.361073 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.361200 kubelet[1898]: W0209 10:29:32.361086 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.361200 kubelet[1898]: E0209 10:29:32.361105 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.361525 kubelet[1898]: E0209 10:29:32.361347 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.361525 kubelet[1898]: W0209 10:29:32.361358 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.361525 kubelet[1898]: E0209 10:29:32.361378 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.361635 kubelet[1898]: E0209 10:29:32.361579 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.361635 kubelet[1898]: W0209 10:29:32.361588 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.361635 kubelet[1898]: E0209 10:29:32.361604 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.362552 kubelet[1898]: E0209 10:29:32.362490 1898 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 10:29:32.362552 kubelet[1898]: W0209 10:29:32.362507 1898 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 10:29:32.362552 kubelet[1898]: E0209 10:29:32.362525 1898 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 10:29:32.387336 env[1352]: time="2024-02-09T10:29:32.387286536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.393783 env[1352]: time="2024-02-09T10:29:32.393744871Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.397768 env[1352]: time="2024-02-09T10:29:32.397741981Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.401956 env[1352]: time="2024-02-09T10:29:32.401919640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:32.402418 env[1352]: time="2024-02-09T10:29:32.402381670Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 10:29:32.404159 env[1352]: time="2024-02-09T10:29:32.404129816Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 10:29:32.427673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1496634052.mount: Deactivated successfully. Feb 9 10:29:32.448760 env[1352]: time="2024-02-09T10:29:32.448705619Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d\"" Feb 9 10:29:32.449508 env[1352]: time="2024-02-09T10:29:32.449287974Z" level=info msg="StartContainer for \"9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d\"" Feb 9 10:29:32.464073 systemd[1]: Started cri-containerd-9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d.scope. Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963633263646632326166663462373532646230636631363630363531 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit: BPF prog-id=73 op=LOAD Feb 9 10:29:32.476000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2031 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963633263646632326166663462373532646230636631363630363531 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit: BPF prog-id=74 op=LOAD Feb 9 10:29:32.476000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2031 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963633263646632326166663462373532646230636631363630363531 Feb 9 10:29:32.476000 audit: BPF prog-id=74 op=UNLOAD Feb 9 10:29:32.476000 audit: BPF prog-id=73 op=UNLOAD Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { perfmon } for pid=2286 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit[2286]: AVC avc: denied { bpf } for pid=2286 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:32.476000 audit: BPF prog-id=75 op=LOAD Feb 9 10:29:32.476000 audit[2286]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2031 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:32.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963633263646632326166663462373532646230636631363630363531 Feb 9 10:29:32.499000 audit: BPF prog-id=75 op=UNLOAD Feb 9 10:29:32.497600 systemd[1]: cri-containerd-9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d.scope: Deactivated successfully. Feb 9 10:29:32.502535 env[1352]: time="2024-02-09T10:29:32.500981126Z" level=info msg="StartContainer for \"9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d\" returns successfully" Feb 9 10:29:32.851233 kubelet[1898]: E0209 10:29:32.850907 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:32.950446 env[1352]: time="2024-02-09T10:29:32.950377126Z" level=info msg="shim disconnected" id=9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d Feb 9 10:29:32.950647 env[1352]: time="2024-02-09T10:29:32.950628975Z" level=warning msg="cleaning up after shim disconnected" id=9cc2cdf22aff4b752db0cf16606515523ed181789f9f011e92c5e53d5f6ba53d namespace=k8s.io Feb 9 10:29:32.950730 env[1352]: time="2024-02-09T10:29:32.950717430Z" level=info msg="cleaning up dead shim" Feb 9 10:29:32.957900 env[1352]: time="2024-02-09T10:29:32.957861931Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:29:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2322 runtime=io.containerd.runc.v2\n" Feb 9 10:29:33.220984 kubelet[1898]: E0209 10:29:33.220665 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:33.259666 env[1352]: time="2024-02-09T10:29:33.259628655Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 10:29:33.272339 kubelet[1898]: I0209 10:29:33.272302 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-td8wm" podStartSLOduration=-9.223372022582537e+09 pod.CreationTimestamp="2024-02-09 10:29:19 +0000 UTC" firstStartedPulling="2024-02-09 10:29:29.213136314 +0000 UTC m=+22.743343264" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:31.264396301 +0000 UTC m=+24.794603251" watchObservedRunningTime="2024-02-09 10:29:33.272239295 +0000 UTC m=+26.802446245" Feb 9 10:29:33.851571 kubelet[1898]: E0209 10:29:33.851534 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:34.815698 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2306714132.mount: Deactivated successfully. Feb 9 10:29:34.852312 kubelet[1898]: E0209 10:29:34.852262 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:35.219899 kubelet[1898]: E0209 10:29:35.219572 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:35.852731 kubelet[1898]: E0209 10:29:35.852694 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:36.853777 kubelet[1898]: E0209 10:29:36.853734 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:36.873491 env[1352]: time="2024-02-09T10:29:36.873449308Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:36.878321 env[1352]: time="2024-02-09T10:29:36.878275986Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:36.881642 env[1352]: time="2024-02-09T10:29:36.881610568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:36.884568 env[1352]: time="2024-02-09T10:29:36.884526258Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:36.884818 env[1352]: time="2024-02-09T10:29:36.884784392Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 10:29:36.886911 env[1352]: time="2024-02-09T10:29:36.886876253Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 10:29:36.919162 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1684150434.mount: Deactivated successfully. Feb 9 10:29:36.937341 env[1352]: time="2024-02-09T10:29:36.937296518Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0\"" Feb 9 10:29:36.938067 env[1352]: time="2024-02-09T10:29:36.938042086Z" level=info msg="StartContainer for \"117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0\"" Feb 9 10:29:36.955946 systemd[1]: Started cri-containerd-117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0.scope. Feb 9 10:29:36.995353 kernel: kauditd_printk_skb: 323 callbacks suppressed Feb 9 10:29:36.995548 kernel: audit: type=1400 audit(1707474576.970:661): avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.970000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.970000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2031 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:37.021918 kernel: audit: type=1300 audit(1707474576.970:661): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2031 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:36.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131376335656233303065326461366365343132653930643534333861 Feb 9 10:29:37.046827 kernel: audit: type=1327 audit(1707474576.970:661): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131376335656233303065326461366365343132653930643534333861 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.065107 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.104075 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.104180 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.121679 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.121766 env[1352]: time="2024-02-09T10:29:37.105143170Z" level=info msg="StartContainer for \"117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0\" returns successfully" Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.139706 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.157593 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:37.175051 kernel: audit: type=1400 audit(1707474576.971:662): avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.971000 audit: BPF prog-id=76 op=LOAD Feb 9 10:29:36.971000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2031 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:36.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131376335656233303065326461366365343132653930643534333861 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.975000 audit: BPF prog-id=77 op=LOAD Feb 9 10:29:36.975000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2031 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:36.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131376335656233303065326461366365343132653930643534333861 Feb 9 10:29:36.993000 audit: BPF prog-id=77 op=UNLOAD Feb 9 10:29:36.993000 audit: BPF prog-id=76 op=UNLOAD Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { perfmon } for pid=2348 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit[2348]: AVC avc: denied { bpf } for pid=2348 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:36.993000 audit: BPF prog-id=78 op=LOAD Feb 9 10:29:36.993000 audit[2348]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2031 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:36.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131376335656233303065326461366365343132653930643534333861 Feb 9 10:29:37.220012 kubelet[1898]: E0209 10:29:37.219975 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:37.853861 kubelet[1898]: E0209 10:29:37.853826 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:38.854415 kubelet[1898]: E0209 10:29:38.854378 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:39.219278 systemd[1]: cri-containerd-117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0.scope: Deactivated successfully. Feb 9 10:29:39.224151 kubelet[1898]: E0209 10:29:39.224124 1898 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:39.223000 audit: BPF prog-id=78 op=UNLOAD Feb 9 10:29:39.244364 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0-rootfs.mount: Deactivated successfully. Feb 9 10:29:39.286298 kubelet[1898]: I0209 10:29:39.285521 1898 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 10:29:39.644224 env[1352]: time="2024-02-09T10:29:39.643779149Z" level=info msg="shim disconnected" id=117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0 Feb 9 10:29:39.644547 env[1352]: time="2024-02-09T10:29:39.644462024Z" level=warning msg="cleaning up after shim disconnected" id=117c5eb300e2da6ce412e90d5438a4514fd1fada556a2175f48a64f810c3c1f0 namespace=k8s.io Feb 9 10:29:39.644547 env[1352]: time="2024-02-09T10:29:39.644484019Z" level=info msg="cleaning up dead shim" Feb 9 10:29:39.651656 env[1352]: time="2024-02-09T10:29:39.651606227Z" level=warning msg="cleanup warnings time=\"2024-02-09T10:29:39Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2395 runtime=io.containerd.runc.v2\n" Feb 9 10:29:39.855193 kubelet[1898]: E0209 10:29:39.855153 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:40.272764 env[1352]: time="2024-02-09T10:29:40.272692876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 10:29:40.856280 kubelet[1898]: E0209 10:29:40.856232 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:41.224966 systemd[1]: Created slice kubepods-besteffort-podd032e776_5142_4805_b328_e933689118b3.slice. Feb 9 10:29:41.228612 env[1352]: time="2024-02-09T10:29:41.228563298Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-th2zs,Uid:d032e776-5142-4805-b328-e933689118b3,Namespace:calico-system,Attempt:0,}" Feb 9 10:29:41.336769 env[1352]: time="2024-02-09T10:29:41.336698192Z" level=error msg="Failed to destroy network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:29:41.340007 env[1352]: time="2024-02-09T10:29:41.337062548Z" level=error msg="encountered an error cleaning up failed sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:29:41.340007 env[1352]: time="2024-02-09T10:29:41.337107538Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-th2zs,Uid:d032e776-5142-4805-b328-e933689118b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:29:41.338018 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f-shm.mount: Deactivated successfully. Feb 9 10:29:41.340188 kubelet[1898]: E0209 10:29:41.337340 1898 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:29:41.340188 kubelet[1898]: E0209 10:29:41.337404 1898 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:41.340188 kubelet[1898]: E0209 10:29:41.337439 1898 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-th2zs" Feb 9 10:29:41.340310 kubelet[1898]: E0209 10:29:41.337484 1898 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-th2zs_calico-system(d032e776-5142-4805-b328-e933689118b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-th2zs_calico-system(d032e776-5142-4805-b328-e933689118b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:41.856858 kubelet[1898]: E0209 10:29:41.856715 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:42.275514 kubelet[1898]: I0209 10:29:42.275110 1898 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:42.275925 env[1352]: time="2024-02-09T10:29:42.275889354Z" level=info msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" Feb 9 10:29:42.300054 env[1352]: time="2024-02-09T10:29:42.299989372Z" level=error msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" failed" error="failed to destroy network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 10:29:42.300392 kubelet[1898]: E0209 10:29:42.300358 1898 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:42.300471 kubelet[1898]: E0209 10:29:42.300459 1898 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f} Feb 9 10:29:42.300518 kubelet[1898]: E0209 10:29:42.300503 1898 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d032e776-5142-4805-b328-e933689118b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 10:29:42.300581 kubelet[1898]: E0209 10:29:42.300539 1898 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d032e776-5142-4805-b328-e933689118b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-th2zs" podUID=d032e776-5142-4805-b328-e933689118b3 Feb 9 10:29:42.856881 kubelet[1898]: E0209 10:29:42.856839 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:43.857832 kubelet[1898]: E0209 10:29:43.857782 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:44.858321 kubelet[1898]: E0209 10:29:44.858275 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:45.498917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount711742421.mount: Deactivated successfully. Feb 9 10:29:45.859547 kubelet[1898]: E0209 10:29:45.859186 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:45.970250 env[1352]: time="2024-02-09T10:29:45.970205764Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:45.976191 env[1352]: time="2024-02-09T10:29:45.976157789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:45.980515 env[1352]: time="2024-02-09T10:29:45.980472598Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:45.984502 env[1352]: time="2024-02-09T10:29:45.984460277Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:45.985143 env[1352]: time="2024-02-09T10:29:45.985118138Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 10:29:45.997313 env[1352]: time="2024-02-09T10:29:45.997248379Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 10:29:46.020925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2029843070.mount: Deactivated successfully. Feb 9 10:29:46.037345 env[1352]: time="2024-02-09T10:29:46.037297611Z" level=info msg="CreateContainer within sandbox \"181c8691904b0940cfa03ca3b7f5a6210031a965fc9e92da394d103af4de6aa2\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34\"" Feb 9 10:29:46.037815 env[1352]: time="2024-02-09T10:29:46.037790309Z" level=info msg="StartContainer for \"0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34\"" Feb 9 10:29:46.054477 systemd[1]: Started cri-containerd-0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34.scope. Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075236 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 10:29:46.075319 kernel: audit: type=1400 audit(1707474586.069:668): avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2031 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:46.118007 kernel: audit: type=1300 audit(1707474586.069:668): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2031 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:46.118088 kernel: audit: type=1327 audit(1707474586.069:668): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303234363235613639613437646463353265656562303930643830 Feb 9 10:29:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303234363235613639613437646463353265656562303930643830 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.159047 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.177347 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.177604 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.213751 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.232567 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.232702 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.268714 kernel: audit: type=1400 audit(1707474586.069:669): avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.069000 audit: BPF prog-id=79 op=LOAD Feb 9 10:29:46.069000 audit[2467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2031 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:46.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303234363235613639613437646463353265656562303930643830 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.075000 audit: BPF prog-id=80 op=LOAD Feb 9 10:29:46.075000 audit[2467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2031 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303234363235613639613437646463353265656562303930643830 Feb 9 10:29:46.092000 audit: BPF prog-id=80 op=UNLOAD Feb 9 10:29:46.092000 audit: BPF prog-id=79 op=UNLOAD Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { perfmon } for pid=2467 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit[2467]: AVC avc: denied { bpf } for pid=2467 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:46.092000 audit: BPF prog-id=81 op=LOAD Feb 9 10:29:46.092000 audit[2467]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2031 pid=2467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:46.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061303234363235613639613437646463353265656562303930643830 Feb 9 10:29:46.270682 env[1352]: time="2024-02-09T10:29:46.270641044Z" level=info msg="StartContainer for \"0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34\" returns successfully" Feb 9 10:29:46.550414 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 10:29:46.550545 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 10:29:46.695780 kubelet[1898]: I0209 10:29:46.695730 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-299vr" podStartSLOduration=-9.223372009159084e+09 pod.CreationTimestamp="2024-02-09 10:29:19 +0000 UTC" firstStartedPulling="2024-02-09 10:29:29.242268705 +0000 UTC m=+22.772475655" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:46.32056917 +0000 UTC m=+39.850776120" watchObservedRunningTime="2024-02-09 10:29:46.695692112 +0000 UTC m=+40.225899062" Feb 9 10:29:46.695969 kubelet[1898]: I0209 10:29:46.695893 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:29:46.700626 systemd[1]: Created slice kubepods-besteffort-poda3de710d_ce73_4928_843c_3a9cdd8f6a7f.slice. Feb 9 10:29:46.835986 kubelet[1898]: E0209 10:29:46.835511 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:46.852936 kubelet[1898]: I0209 10:29:46.852893 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tfm52\" (UniqueName: \"kubernetes.io/projected/a3de710d-ce73-4928-843c-3a9cdd8f6a7f-kube-api-access-tfm52\") pod \"nginx-deployment-8ffc5cf85-btgcm\" (UID: \"a3de710d-ce73-4928-843c-3a9cdd8f6a7f\") " pod="default/nginx-deployment-8ffc5cf85-btgcm" Feb 9 10:29:46.860221 kubelet[1898]: E0209 10:29:46.860203 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:47.004736 env[1352]: time="2024-02-09T10:29:47.004693653Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-btgcm,Uid:a3de710d-ce73-4928-843c-3a9cdd8f6a7f,Namespace:default,Attempt:0,}" Feb 9 10:29:47.162462 kernel: Initializing XFRM netlink socket Feb 9 10:29:47.195452 systemd-networkd[1493]: cali3c300ce8289: Link UP Feb 9 10:29:47.208930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:29:47.209031 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3c300ce8289: link becomes ready Feb 9 10:29:47.209885 systemd-networkd[1493]: cali3c300ce8289: Gained carrier Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.073 [INFO][2525] utils.go 100: File /var/lib/calico/mtu does not exist Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.087 [INFO][2525] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0 nginx-deployment-8ffc5cf85- default a3de710d-ce73-4928-843c-3a9cdd8f6a7f 1187 0 2024-02-09 10:29:46 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.13 nginx-deployment-8ffc5cf85-btgcm eth0 default [] [] [kns.default ksa.default.default] cali3c300ce8289 [] []}} ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.087 [INFO][2525] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.108 [INFO][2537] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" HandleID="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Workload="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.120 [INFO][2537] ipam_plugin.go 268: Auto assigning IP ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" HandleID="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Workload="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a9a60), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"nginx-deployment-8ffc5cf85-btgcm", "timestamp":"2024-02-09 10:29:47.1084409 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.120 [INFO][2537] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.120 [INFO][2537] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.120 [INFO][2537] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.121 [INFO][2537] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.124 [INFO][2537] ipam.go 372: Looking up existing affinities for host host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.128 [INFO][2537] ipam.go 489: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.129 [INFO][2537] ipam.go 155: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.131 [INFO][2537] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.131 [INFO][2537] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.132 [INFO][2537] ipam.go 1682: Creating new handle: k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063 Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.135 [INFO][2537] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.139 [INFO][2537] ipam.go 1216: Successfully claimed IPs: [192.168.98.65/26] block=192.168.98.64/26 handle="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.139 [INFO][2537] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.65/26] handle="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" host="10.200.20.13" Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.139 [INFO][2537] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:29:47.216481 env[1352]: 2024-02-09 10:29:47.139 [INFO][2537] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.65/26] IPv6=[] ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" HandleID="k8s-pod-network.faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Workload="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.140 [INFO][2525] k8s.go 385: Populated endpoint ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a3de710d-ce73-4928-843c-3a9cdd8f6a7f", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-btgcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3c300ce8289", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.141 [INFO][2525] k8s.go 386: Calico CNI using IPs: [192.168.98.65/32] ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.141 [INFO][2525] dataplane_linux.go 68: Setting the host side veth name to cali3c300ce8289 ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.209 [INFO][2525] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.209 [INFO][2525] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"a3de710d-ce73-4928-843c-3a9cdd8f6a7f", ResourceVersion:"1187", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063", Pod:"nginx-deployment-8ffc5cf85-btgcm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali3c300ce8289", MAC:"3a:0d:db:dd:91:6b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:47.217067 env[1352]: 2024-02-09 10:29:47.214 [INFO][2525] k8s.go 491: Wrote updated endpoint to datastore ContainerID="faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063" Namespace="default" Pod="nginx-deployment-8ffc5cf85-btgcm" WorkloadEndpoint="10.200.20.13-k8s-nginx--deployment--8ffc5cf85--btgcm-eth0" Feb 9 10:29:47.234372 env[1352]: time="2024-02-09T10:29:47.234280356Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:47.234530 env[1352]: time="2024-02-09T10:29:47.234379056Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:47.234530 env[1352]: time="2024-02-09T10:29:47.234404611Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:47.234749 env[1352]: time="2024-02-09T10:29:47.234697472Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063 pid=2565 runtime=io.containerd.runc.v2 Feb 9 10:29:47.250405 systemd[1]: Started cri-containerd-faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063.scope. Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.264000 audit: BPF prog-id=82 op=LOAD Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2565 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661613261633038373733313366346263363431616339373339666536 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2565 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661613261633038373733313366346263363431616339373339666536 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit: BPF prog-id=83 op=LOAD Feb 9 10:29:47.265000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2565 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661613261633038373733313366346263363431616339373339666536 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit: BPF prog-id=84 op=LOAD Feb 9 10:29:47.265000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2565 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661613261633038373733313366346263363431616339373339666536 Feb 9 10:29:47.265000 audit: BPF prog-id=84 op=UNLOAD Feb 9 10:29:47.265000 audit: BPF prog-id=83 op=UNLOAD Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { perfmon } for pid=2575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit[2575]: AVC avc: denied { bpf } for pid=2575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:47.265000 audit: BPF prog-id=85 op=LOAD Feb 9 10:29:47.265000 audit[2575]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2565 pid=2575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661613261633038373733313366346263363431616339373339666536 Feb 9 10:29:47.285005 env[1352]: time="2024-02-09T10:29:47.284958222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-btgcm,Uid:a3de710d-ce73-4928-843c-3a9cdd8f6a7f,Namespace:default,Attempt:0,} returns sandbox id \"faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063\"" Feb 9 10:29:47.286806 env[1352]: time="2024-02-09T10:29:47.286772975Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 10:29:47.830000 audit[2629]: AVC avc: denied { write } for pid=2629 comm="tee" name="fd" dev="proc" ino=17803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.830000 audit[2629]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffe0e796a a2=241 a3=1b6 items=1 ppid=2607 pid=2629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.830000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 10:29:47.830000 audit: PATH item=0 name="/dev/fd/63" inode=17783 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.830000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.833000 audit[2639]: AVC avc: denied { write } for pid=2639 comm="tee" name="fd" dev="proc" ino=17809 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.833000 audit[2639]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffda516979 a2=241 a3=1b6 items=1 ppid=2609 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.833000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 10:29:47.833000 audit: PATH item=0 name="/dev/fd/63" inode=17798 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.840000 audit[2652]: AVC avc: denied { write } for pid=2652 comm="tee" name="fd" dev="proc" ino=18693 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.840000 audit[2652]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff7de897a a2=241 a3=1b6 items=1 ppid=2606 pid=2652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.840000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 10:29:47.840000 audit: PATH item=0 name="/dev/fd/63" inode=18683 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.840000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.851000 audit[2665]: AVC avc: denied { write } for pid=2665 comm="tee" name="fd" dev="proc" ino=18703 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.851000 audit[2665]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc26f979 a2=241 a3=1b6 items=1 ppid=2623 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.851000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 10:29:47.851000 audit: PATH item=0 name="/dev/fd/63" inode=18697 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.856000 audit[2667]: AVC avc: denied { write } for pid=2667 comm="tee" name="fd" dev="proc" ino=18708 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.856000 audit[2667]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff15e0979 a2=241 a3=1b6 items=1 ppid=2614 pid=2667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.856000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 10:29:47.856000 audit: PATH item=0 name="/dev/fd/63" inode=18698 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.856000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.859000 audit[2670]: AVC avc: denied { write } for pid=2670 comm="tee" name="fd" dev="proc" ino=17830 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.860687 kubelet[1898]: E0209 10:29:47.860652 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:47.859000 audit[2670]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc648797b a2=241 a3=1b6 items=1 ppid=2617 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.859000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 10:29:47.859000 audit: PATH item=0 name="/dev/fd/63" inode=18705 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.859000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:47.874000 audit[2674]: AVC avc: denied { write } for pid=2674 comm="tee" name="fd" dev="proc" ino=17834 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 10:29:47.874000 audit[2674]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffea88b969 a2=241 a3=1b6 items=1 ppid=2618 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:47.874000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 10:29:47.874000 audit: PATH item=0 name="/dev/fd/63" inode=17827 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:29:47.874000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.140000 audit: BPF prog-id=86 op=LOAD Feb 9 10:29:48.140000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef248858 a2=70 a3=0 items=0 ppid=2613 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.140000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:29:48.141000 audit: BPF prog-id=86 op=UNLOAD Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit: BPF prog-id=87 op=LOAD Feb 9 10:29:48.141000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffef248858 a2=70 a3=4a174c items=0 ppid=2613 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.141000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:29:48.141000 audit: BPF prog-id=87 op=UNLOAD Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffef248888 a2=70 a3=b0d879f items=0 ppid=2613 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.141000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.141000 audit: BPF prog-id=88 op=LOAD Feb 9 10:29:48.141000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffef2487d8 a2=70 a3=b0d87b9 items=0 ppid=2613 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.141000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 10:29:48.145000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.145000 audit[2747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffefb94f88 a2=70 a3=0 items=0 ppid=2613 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:29:48.145000 audit[2747]: AVC avc: denied { bpf } for pid=2747 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:48.145000 audit[2747]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffefb94e68 a2=70 a3=2 items=0 ppid=2613 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.145000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 10:29:48.151000 audit: BPF prog-id=88 op=UNLOAD Feb 9 10:29:48.280000 audit[2769]: NETFILTER_CFG table=mangle:82 family=2 entries=19 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:48.280000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe016aaa0 a2=0 a3=ffff82f92fa8 items=0 ppid=2613 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.280000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:48.282000 audit[2770]: NETFILTER_CFG table=nat:83 family=2 entries=16 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:48.282000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffd5638c10 a2=0 a3=ffff8841dfa8 items=0 ppid=2613 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:48.288000 audit[2772]: NETFILTER_CFG table=filter:84 family=2 entries=71 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:48.288000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=36604 a0=3 a1=ffffc7824a90 a2=0 a3=ffffbc0d8fa8 items=0 ppid=2613 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.288000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:48.299000 audit[2768]: NETFILTER_CFG table=raw:85 family=2 entries=19 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:48.299000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc4523540 a2=0 a3=ffff92dccfa8 items=0 ppid=2613 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:48.299000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:48.461523 systemd-networkd[1493]: cali3c300ce8289: Gained IPv6LL Feb 9 10:29:48.861972 kubelet[1898]: E0209 10:29:48.861570 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:49.223496 systemd-networkd[1493]: vxlan.calico: Link UP Feb 9 10:29:49.223502 systemd-networkd[1493]: vxlan.calico: Gained carrier Feb 9 10:29:49.862807 kubelet[1898]: E0209 10:29:49.862759 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:50.317540 systemd-networkd[1493]: vxlan.calico: Gained IPv6LL Feb 9 10:29:50.328166 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1218528138.mount: Deactivated successfully. Feb 9 10:29:50.862980 kubelet[1898]: E0209 10:29:50.862913 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:51.864053 kubelet[1898]: E0209 10:29:51.863999 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:52.189834 env[1352]: time="2024-02-09T10:29:52.189781588Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:52.195194 env[1352]: time="2024-02-09T10:29:52.195154804Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:52.200599 env[1352]: time="2024-02-09T10:29:52.200560695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:52.204806 env[1352]: time="2024-02-09T10:29:52.204774284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:52.205486 env[1352]: time="2024-02-09T10:29:52.205455959Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 10:29:52.207705 env[1352]: time="2024-02-09T10:29:52.207670274Z" level=info msg="CreateContainer within sandbox \"faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 10:29:52.232300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount413017442.mount: Deactivated successfully. Feb 9 10:29:52.237628 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3629914557.mount: Deactivated successfully. Feb 9 10:29:52.247105 env[1352]: time="2024-02-09T10:29:52.247055145Z" level=info msg="CreateContainer within sandbox \"faa2ac0877313f4bc641ac9739fe6cde987332c5d47e161a4c39929d4eff9063\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"052c4043b2f070f86735a869dd4d6485fe63393b6c8f5184a16ca189377bbe80\"" Feb 9 10:29:52.247663 env[1352]: time="2024-02-09T10:29:52.247549334Z" level=info msg="StartContainer for \"052c4043b2f070f86735a869dd4d6485fe63393b6c8f5184a16ca189377bbe80\"" Feb 9 10:29:52.264701 systemd[1]: Started cri-containerd-052c4043b2f070f86735a869dd4d6485fe63393b6c8f5184a16ca189377bbe80.scope. Feb 9 10:29:52.283462 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 9 10:29:52.283590 kernel: audit: type=1400 audit(1707474592.276:712): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.341638 kernel: audit: type=1400 audit(1707474592.276:713): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.341775 kernel: audit: type=1400 audit(1707474592.276:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.361302 kernel: audit: type=1400 audit(1707474592.276:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.361459 kernel: audit: type=1400 audit(1707474592.276:716): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.402814 kernel: audit: type=1400 audit(1707474592.276:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.422882 kernel: audit: type=1400 audit(1707474592.276:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.443877 kernel: audit: type=1400 audit(1707474592.276:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.463146 kernel: audit: type=1400 audit(1707474592.276:720): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.482247 kernel: audit: type=1400 audit(1707474592.282:721): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.282000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.282000 audit: BPF prog-id=89 op=LOAD Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2565 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:52.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326334303433623266303730663836373335613836396464346436 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2565 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:52.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326334303433623266303730663836373335613836396464346436 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit: BPF prog-id=90 op=LOAD Feb 9 10:29:52.301000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2565 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:52.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326334303433623266303730663836373335613836396464346436 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit: BPF prog-id=91 op=LOAD Feb 9 10:29:52.301000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2565 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:52.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326334303433623266303730663836373335613836396464346436 Feb 9 10:29:52.301000 audit: BPF prog-id=91 op=UNLOAD Feb 9 10:29:52.301000 audit: BPF prog-id=90 op=UNLOAD Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { perfmon } for pid=2794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit[2794]: AVC avc: denied { bpf } for pid=2794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:52.301000 audit: BPF prog-id=92 op=LOAD Feb 9 10:29:52.301000 audit[2794]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2565 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:52.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035326334303433623266303730663836373335613836396464346436 Feb 9 10:29:52.486932 env[1352]: time="2024-02-09T10:29:52.486872929Z" level=info msg="StartContainer for \"052c4043b2f070f86735a869dd4d6485fe63393b6c8f5184a16ca189377bbe80\" returns successfully" Feb 9 10:29:52.685997 kubelet[1898]: I0209 10:29:52.685927 1898 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 9 10:29:52.864732 kubelet[1898]: E0209 10:29:52.864630 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:53.314641 kubelet[1898]: I0209 10:29:53.314603 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-btgcm" podStartSLOduration=-9.223372029540216e+09 pod.CreationTimestamp="2024-02-09 10:29:46 +0000 UTC" firstStartedPulling="2024-02-09 10:29:47.286059359 +0000 UTC m=+40.816266309" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:29:53.314537656 +0000 UTC m=+46.844744646" watchObservedRunningTime="2024-02-09 10:29:53.314560212 +0000 UTC m=+46.844767162" Feb 9 10:29:53.865178 kubelet[1898]: E0209 10:29:53.865124 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:54.865658 kubelet[1898]: E0209 10:29:54.865617 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:55.866372 kubelet[1898]: E0209 10:29:55.866344 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:56.220814 env[1352]: time="2024-02-09T10:29:56.220752683Z" level=info msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" Feb 9 10:29:56.287911 kubelet[1898]: I0209 10:29:56.287872 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:29:56.292480 systemd[1]: Created slice kubepods-besteffort-pod609bbbac_ce89_4c3d_865b_ad7c7b62bbab.slice. Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.274 [INFO][2907] k8s.go 578: Cleaning up netns ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.275 [INFO][2907] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" iface="eth0" netns="/var/run/netns/cni-6cc392f3-f9a9-0fb7-a762-7f49886e9cc8" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.275 [INFO][2907] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" iface="eth0" netns="/var/run/netns/cni-6cc392f3-f9a9-0fb7-a762-7f49886e9cc8" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.275 [INFO][2907] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" iface="eth0" netns="/var/run/netns/cni-6cc392f3-f9a9-0fb7-a762-7f49886e9cc8" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.275 [INFO][2907] k8s.go 585: Releasing IP address(es) ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.275 [INFO][2907] utils.go 188: Calico CNI releasing IP address ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.297 [INFO][2941] ipam_plugin.go 415: Releasing address using handleID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.297 [INFO][2941] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.297 [INFO][2941] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.312 [WARNING][2941] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.312 [INFO][2941] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.315 [INFO][2941] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:29:56.318745 env[1352]: 2024-02-09 10:29:56.317 [INFO][2907] k8s.go 591: Teardown processing complete. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:29:56.320349 systemd[1]: run-netns-cni\x2d6cc392f3\x2df9a9\x2d0fb7\x2da762\x2d7f49886e9cc8.mount: Deactivated successfully. Feb 9 10:29:56.322318 env[1352]: time="2024-02-09T10:29:56.320866818Z" level=info msg="TearDown network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" successfully" Feb 9 10:29:56.322318 env[1352]: time="2024-02-09T10:29:56.320905052Z" level=info msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" returns successfully" Feb 9 10:29:56.322894 env[1352]: time="2024-02-09T10:29:56.322859760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-th2zs,Uid:d032e776-5142-4805-b328-e933689118b3,Namespace:calico-system,Attempt:1,}" Feb 9 10:29:56.354000 audit[2938]: NETFILTER_CFG table=filter:86 family=2 entries=18 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.354000 audit[2938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffc58573f0 a2=0 a3=ffff874f76c0 items=0 ppid=2098 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.360000 audit[2938]: NETFILTER_CFG table=nat:87 family=2 entries=94 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.360000 audit[2938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffc58573f0 a2=0 a3=ffff874f76c0 items=0 ppid=2098 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.405000 audit[2984]: NETFILTER_CFG table=filter:88 family=2 entries=30 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.405000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffc47b9070 a2=0 a3=ffff8a1806c0 items=0 ppid=2098 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.405000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.408251 kubelet[1898]: I0209 10:29:56.408220 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/609bbbac-ce89-4c3d-865b-ad7c7b62bbab-data\") pod \"nfs-server-provisioner-0\" (UID: \"609bbbac-ce89-4c3d-865b-ad7c7b62bbab\") " pod="default/nfs-server-provisioner-0" Feb 9 10:29:56.408366 kubelet[1898]: I0209 10:29:56.408268 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4z2lt\" (UniqueName: \"kubernetes.io/projected/609bbbac-ce89-4c3d-865b-ad7c7b62bbab-kube-api-access-4z2lt\") pod \"nfs-server-provisioner-0\" (UID: \"609bbbac-ce89-4c3d-865b-ad7c7b62bbab\") " pod="default/nfs-server-provisioner-0" Feb 9 10:29:56.407000 audit[2984]: NETFILTER_CFG table=nat:89 family=2 entries=94 op=nft_register_rule pid=2984 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:29:56.407000 audit[2984]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffc47b9070 a2=0 a3=ffff8a1806c0 items=0 ppid=2098 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:29:56.571452 systemd-networkd[1493]: calid3d62a4a78d: Link UP Feb 9 10:29:56.586657 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:29:56.586798 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid3d62a4a78d: link becomes ready Feb 9 10:29:56.587331 systemd-networkd[1493]: calid3d62a4a78d: Gained carrier Feb 9 10:29:56.595685 env[1352]: time="2024-02-09T10:29:56.595641602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:609bbbac-ce89-4c3d-865b-ad7c7b62bbab,Namespace:default,Attempt:0,}" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.417 [INFO][2959] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-csi--node--driver--th2zs-eth0 csi-node-driver- calico-system d032e776-5142-4805-b328-e933689118b3 1243 0 2024-02-09 10:29:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.13 csi-node-driver-th2zs eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid3d62a4a78d [] []}} ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.417 [INFO][2959] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.457 [INFO][2985] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" HandleID="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.523 [INFO][2985] ipam_plugin.go 268: Auto assigning IP ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" HandleID="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001184b0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.13", "pod":"csi-node-driver-th2zs", "timestamp":"2024-02-09 10:29:56.457827663 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.523 [INFO][2985] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.523 [INFO][2985] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.523 [INFO][2985] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.525 [INFO][2985] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.545 [INFO][2985] ipam.go 372: Looking up existing affinities for host host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.549 [INFO][2985] ipam.go 489: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.551 [INFO][2985] ipam.go 155: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.553 [INFO][2985] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.553 [INFO][2985] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.555 [INFO][2985] ipam.go 1682: Creating new handle: k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.562 [INFO][2985] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.567 [INFO][2985] ipam.go 1216: Successfully claimed IPs: [192.168.98.66/26] block=192.168.98.64/26 handle="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.567 [INFO][2985] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.66/26] handle="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" host="10.200.20.13" Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.567 [INFO][2985] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:29:56.596649 env[1352]: 2024-02-09 10:29:56.567 [INFO][2985] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.66/26] IPv6=[] ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" HandleID="k8s-pod-network.af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.569 [INFO][2959] k8s.go 385: Populated endpoint ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--th2zs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d032e776-5142-4805-b328-e933689118b3", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"csi-node-driver-th2zs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid3d62a4a78d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.569 [INFO][2959] k8s.go 386: Calico CNI using IPs: [192.168.98.66/32] ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.569 [INFO][2959] dataplane_linux.go 68: Setting the host side veth name to calid3d62a4a78d ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.587 [INFO][2959] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.588 [INFO][2959] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--th2zs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d032e776-5142-4805-b328-e933689118b3", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a", Pod:"csi-node-driver-th2zs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid3d62a4a78d", MAC:"92:43:70:fc:fc:7f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:56.600068 env[1352]: 2024-02-09 10:29:56.594 [INFO][2959] k8s.go 491: Wrote updated endpoint to datastore ContainerID="af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a" Namespace="calico-system" Pod="csi-node-driver-th2zs" WorkloadEndpoint="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:29:56.616000 audit[3008]: NETFILTER_CFG table=filter:90 family=2 entries=40 op=nft_register_chain pid=3008 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:56.616000 audit[3008]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffc74ceda0 a2=0 a3=ffff82db3fa8 items=0 ppid=2613 pid=3008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.616000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:56.625483 env[1352]: time="2024-02-09T10:29:56.625278214Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:56.625483 env[1352]: time="2024-02-09T10:29:56.625318247Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:56.625483 env[1352]: time="2024-02-09T10:29:56.625330245Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:56.625660 env[1352]: time="2024-02-09T10:29:56.625504296Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a pid=3016 runtime=io.containerd.runc.v2 Feb 9 10:29:56.639260 systemd[1]: Started cri-containerd-af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a.scope. Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit: BPF prog-id=93 op=LOAD Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3016 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356534653165396432343835353634363533646363643830633830 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3016 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356534653165396432343835353634363533646363643830633830 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit: BPF prog-id=94 op=LOAD Feb 9 10:29:56.652000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3016 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356534653165396432343835353634363533646363643830633830 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit: BPF prog-id=95 op=LOAD Feb 9 10:29:56.652000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3016 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356534653165396432343835353634363533646363643830633830 Feb 9 10:29:56.652000 audit: BPF prog-id=95 op=UNLOAD Feb 9 10:29:56.652000 audit: BPF prog-id=94 op=UNLOAD Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.652000 audit: BPF prog-id=96 op=LOAD Feb 9 10:29:56.652000 audit[3025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3016 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166356534653165396432343835353634363533646363643830633830 Feb 9 10:29:56.675055 env[1352]: time="2024-02-09T10:29:56.675012056Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-th2zs,Uid:d032e776-5142-4805-b328-e933689118b3,Namespace:calico-system,Attempt:1,} returns sandbox id \"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a\"" Feb 9 10:29:56.677071 env[1352]: time="2024-02-09T10:29:56.677035553Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 10:29:56.756191 systemd-networkd[1493]: cali60e51b789ff: Link UP Feb 9 10:29:56.765229 systemd-networkd[1493]: cali60e51b789ff: Gained carrier Feb 9 10:29:56.765531 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.690 [INFO][3041] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 609bbbac-ce89-4c3d-865b-ad7c7b62bbab 1251 0 2024-02-09 10:29:56 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.13 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.690 [INFO][3041] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.714 [INFO][3067] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" HandleID="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.728 [INFO][3067] ipam_plugin.go 268: Auto assigning IP ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" HandleID="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400021f9d0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 10:29:56.714950561 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.728 [INFO][3067] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.728 [INFO][3067] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.728 [INFO][3067] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.731 [INFO][3067] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.734 [INFO][3067] ipam.go 372: Looking up existing affinities for host host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.737 [INFO][3067] ipam.go 489: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.739 [INFO][3067] ipam.go 155: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.741 [INFO][3067] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.741 [INFO][3067] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.743 [INFO][3067] ipam.go 1682: Creating new handle: k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923 Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.746 [INFO][3067] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.750 [INFO][3067] ipam.go 1216: Successfully claimed IPs: [192.168.98.67/26] block=192.168.98.64/26 handle="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.751 [INFO][3067] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.67/26] handle="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" host="10.200.20.13" Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.751 [INFO][3067] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:29:56.773888 env[1352]: 2024-02-09 10:29:56.751 [INFO][3067] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.67/26] IPv6=[] ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" HandleID="k8s-pod-network.7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Workload="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.774563 env[1352]: 2024-02-09 10:29:56.752 [INFO][3041] k8s.go 385: Populated endpoint ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"609bbbac-ce89-4c3d-865b-ad7c7b62bbab", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.98.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:56.774563 env[1352]: 2024-02-09 10:29:56.753 [INFO][3041] k8s.go 386: Calico CNI using IPs: [192.168.98.67/32] ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.774563 env[1352]: 2024-02-09 10:29:56.753 [INFO][3041] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.774563 env[1352]: 2024-02-09 10:29:56.765 [INFO][3041] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.774708 env[1352]: 2024-02-09 10:29:56.766 [INFO][3041] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"609bbbac-ce89-4c3d-865b-ad7c7b62bbab", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.98.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"fa:8f:a4:d8:ad:c5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:29:56.774708 env[1352]: 2024-02-09 10:29:56.772 [INFO][3041] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.13-k8s-nfs--server--provisioner--0-eth0" Feb 9 10:29:56.794000 audit[3088]: NETFILTER_CFG table=filter:91 family=2 entries=38 op=nft_register_chain pid=3088 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:29:56.794000 audit[3088]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffcf4ccd90 a2=0 a3=ffffa228bfa8 items=0 ppid=2613 pid=3088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:29:56.797726 env[1352]: time="2024-02-09T10:29:56.797657969Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:29:56.797831 env[1352]: time="2024-02-09T10:29:56.797734836Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:29:56.797831 env[1352]: time="2024-02-09T10:29:56.797761871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:29:56.798045 env[1352]: time="2024-02-09T10:29:56.798001471Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923 pid=3096 runtime=io.containerd.runc.v2 Feb 9 10:29:56.810389 systemd[1]: Started cri-containerd-7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923.scope. Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.825000 audit: BPF prog-id=97 op=LOAD Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3096 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766613063353661333038666337356433653037373833393863393063 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3096 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766613063353661333038666337356433653037373833393863393063 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit: BPF prog-id=98 op=LOAD Feb 9 10:29:56.827000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3096 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766613063353661333038666337356433653037373833393863393063 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit: BPF prog-id=99 op=LOAD Feb 9 10:29:56.827000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3096 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766613063353661333038666337356433653037373833393863393063 Feb 9 10:29:56.827000 audit: BPF prog-id=99 op=UNLOAD Feb 9 10:29:56.827000 audit: BPF prog-id=98 op=UNLOAD Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { perfmon } for pid=3106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit[3106]: AVC avc: denied { bpf } for pid=3106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:56.827000 audit: BPF prog-id=100 op=LOAD Feb 9 10:29:56.827000 audit[3106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3096 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:56.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766613063353661333038666337356433653037373833393863393063 Feb 9 10:29:56.847619 env[1352]: time="2024-02-09T10:29:56.847578340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:609bbbac-ce89-4c3d-865b-ad7c7b62bbab,Namespace:default,Attempt:0,} returns sandbox id \"7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923\"" Feb 9 10:29:56.867720 kubelet[1898]: E0209 10:29:56.867674 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:57.868541 kubelet[1898]: E0209 10:29:57.868492 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:57.997710 systemd-networkd[1493]: cali60e51b789ff: Gained IPv6LL Feb 9 10:29:58.143139 env[1352]: time="2024-02-09T10:29:58.143006100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:58.150709 env[1352]: time="2024-02-09T10:29:58.150648610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:58.156304 env[1352]: time="2024-02-09T10:29:58.156266531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:58.160755 env[1352]: time="2024-02-09T10:29:58.160721722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:29:58.161136 env[1352]: time="2024-02-09T10:29:58.161111739Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 10:29:58.162798 env[1352]: time="2024-02-09T10:29:58.162769627Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 10:29:58.163930 env[1352]: time="2024-02-09T10:29:58.163900802Z" level=info msg="CreateContainer within sandbox \"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 10:29:58.199901 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1134870433.mount: Deactivated successfully. Feb 9 10:29:58.221152 env[1352]: time="2024-02-09T10:29:58.221094687Z" level=info msg="CreateContainer within sandbox \"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0af3750b182d04f1cffcc9685cfb7cc2c27f8dfcad055fe760016e7a8d613dac\"" Feb 9 10:29:58.222122 env[1352]: time="2024-02-09T10:29:58.222096363Z" level=info msg="StartContainer for \"0af3750b182d04f1cffcc9685cfb7cc2c27f8dfcad055fe760016e7a8d613dac\"" Feb 9 10:29:58.246341 systemd[1]: Started cri-containerd-0af3750b182d04f1cffcc9685cfb7cc2c27f8dfcad055fe760016e7a8d613dac.scope. Feb 9 10:29:58.288221 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 9 10:29:58.288382 kernel: audit: type=1400 audit(1707474598.263:772): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3016 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:58.315422 kernel: audit: type=1300 audit(1707474598.263:772): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3016 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:58.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061663337353062313832643034663163666663633936383563666237 Feb 9 10:29:58.344933 systemd[1]: run-containerd-runc-k8s.io-0af3750b182d04f1cffcc9685cfb7cc2c27f8dfcad055fe760016e7a8d613dac-runc.DV9bSf.mount: Deactivated successfully. Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.365347 kernel: audit: type=1327 audit(1707474598.263:772): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061663337353062313832643034663163666663633936383563666237 Feb 9 10:29:58.365560 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.382843 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.402469 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.421759 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.439493 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.440397 env[1352]: time="2024-02-09T10:29:58.440346664Z" level=info msg="StartContainer for \"0af3750b182d04f1cffcc9685cfb7cc2c27f8dfcad055fe760016e7a8d613dac\" returns successfully" Feb 9 10:29:58.457442 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.475417 kernel: audit: type=1400 audit(1707474598.263:773): avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.263000 audit: BPF prog-id=101 op=LOAD Feb 9 10:29:58.263000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3016 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:58.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061663337353062313832643034663163666663633936383563666237 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.268000 audit: BPF prog-id=102 op=LOAD Feb 9 10:29:58.268000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3016 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:58.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061663337353062313832643034663163666663633936383563666237 Feb 9 10:29:58.287000 audit: BPF prog-id=102 op=UNLOAD Feb 9 10:29:58.287000 audit: BPF prog-id=101 op=UNLOAD Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { perfmon } for pid=3138 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit[3138]: AVC avc: denied { bpf } for pid=3138 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:29:58.288000 audit: BPF prog-id=103 op=LOAD Feb 9 10:29:58.288000 audit[3138]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3016 pid=3138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:29:58.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061663337353062313832643034663163666663633936383563666237 Feb 9 10:29:58.509655 systemd-networkd[1493]: calid3d62a4a78d: Gained IPv6LL Feb 9 10:29:58.869637 kubelet[1898]: E0209 10:29:58.869577 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:29:59.870247 kubelet[1898]: E0209 10:29:59.870208 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:00.870974 kubelet[1898]: E0209 10:30:00.870914 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:01.317293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3173187287.mount: Deactivated successfully. Feb 9 10:30:01.871290 kubelet[1898]: E0209 10:30:01.871235 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:02.871824 kubelet[1898]: E0209 10:30:02.871763 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:03.471737 env[1352]: time="2024-02-09T10:30:03.471678928Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:03.483113 env[1352]: time="2024-02-09T10:30:03.483048863Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:03.487941 env[1352]: time="2024-02-09T10:30:03.487889617Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:03.493717 env[1352]: time="2024-02-09T10:30:03.493658512Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:03.494749 env[1352]: time="2024-02-09T10:30:03.494711754Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 10:30:03.496062 env[1352]: time="2024-02-09T10:30:03.496026757Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 10:30:03.497239 env[1352]: time="2024-02-09T10:30:03.497203301Z" level=info msg="CreateContainer within sandbox \"7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 10:30:03.527585 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2290672332.mount: Deactivated successfully. Feb 9 10:30:03.532946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2370565325.mount: Deactivated successfully. Feb 9 10:30:03.549395 env[1352]: time="2024-02-09T10:30:03.549338683Z" level=info msg="CreateContainer within sandbox \"7fa0c56a308fc75d3e0778398c90c98f669fa4eee0b0edbaa471a9dc370b1923\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"66f31dcb94d9638bb0ba611acaf2e54e9b5dbee97c3f91a27c598cc008d86238\"" Feb 9 10:30:03.550241 env[1352]: time="2024-02-09T10:30:03.550213151Z" level=info msg="StartContainer for \"66f31dcb94d9638bb0ba611acaf2e54e9b5dbee97c3f91a27c598cc008d86238\"" Feb 9 10:30:03.569238 systemd[1]: Started cri-containerd-66f31dcb94d9638bb0ba611acaf2e54e9b5dbee97c3f91a27c598cc008d86238.scope. Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.587171 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 10:30:03.587305 kernel: audit: type=1400 audit(1707474603.581:778): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.622372 kernel: audit: type=1400 audit(1707474603.581:779): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.622477 kernel: audit: type=1400 audit(1707474603.581:780): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.661282 kernel: audit: type=1400 audit(1707474603.581:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.661687 kernel: audit: type=1400 audit(1707474603.581:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.698492 kernel: audit: type=1400 audit(1707474603.581:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.716666 kernel: audit: type=1400 audit(1707474603.581:784): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.735536 kernel: audit: type=1400 audit(1707474603.581:785): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.742496 kernel: audit: type=1400 audit(1707474603.581:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.770872 kernel: audit: type=1400 audit(1707474603.581:787): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.581000 audit: BPF prog-id=104 op=LOAD Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3096 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663331646362393464393633386262306261363131616361663265 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3096 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663331646362393464393633386262306261363131616361663265 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.592000 audit: BPF prog-id=105 op=LOAD Feb 9 10:30:03.592000 audit[3182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3096 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.592000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663331646362393464393633386262306261363131616361663265 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit: BPF prog-id=106 op=LOAD Feb 9 10:30:03.603000 audit[3182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3096 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663331646362393464393633386262306261363131616361663265 Feb 9 10:30:03.603000 audit: BPF prog-id=106 op=UNLOAD Feb 9 10:30:03.603000 audit: BPF prog-id=105 op=UNLOAD Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { perfmon } for pid=3182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit[3182]: AVC avc: denied { bpf } for pid=3182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:03.603000 audit: BPF prog-id=107 op=LOAD Feb 9 10:30:03.603000 audit[3182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3096 pid=3182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:03.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636663331646362393464393633386262306261363131616361663265 Feb 9 10:30:03.775843 env[1352]: time="2024-02-09T10:30:03.775790405Z" level=info msg="StartContainer for \"66f31dcb94d9638bb0ba611acaf2e54e9b5dbee97c3f91a27c598cc008d86238\" returns successfully" Feb 9 10:30:03.791000 audit[3210]: AVC avc: denied { search } for pid=3210 comm="rpcbind" name="crypto" dev="proc" ino=21227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:30:03.791000 audit[3210]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff84ebf000 a2=0 a3=0 items=0 ppid=3193 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 key=(null) Feb 9 10:30:03.791000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 10:30:03.831000 audit[3215]: AVC avc: denied { search } for pid=3215 comm="dbus-daemon" name="crypto" dev="proc" ino=21227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:30:03.831000 audit[3215]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff93eef000 a2=0 a3=0 items=0 ppid=3193 pid=3215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 key=(null) Feb 9 10:30:03.831000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:30:03.834000 audit[3216]: AVC avc: denied { watch } for pid=3216 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537946 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c303,c432 tclass=dir permissive=0 Feb 9 10:30:03.834000 audit[3216]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab2068fce0 a2=2c8 a3=aaab2068ba60 items=0 ppid=3193 pid=3216 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 key=(null) Feb 9 10:30:03.834000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 10:30:03.839000 audit[3217]: AVC avc: denied { read } for pid=3217 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20339 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 10:30:03.839000 audit[3217]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffaf28a570 a2=80000 a3=0 items=0 ppid=3193 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 key=(null) Feb 9 10:30:03.839000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:30:03.840000 audit[3217]: AVC avc: denied { search } for pid=3217 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21227 scontext=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 10:30:03.840000 audit[3217]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffae61f000 a2=0 a3=0 items=0 ppid=3193 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c303,c432 key=(null) Feb 9 10:30:03.840000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 10:30:03.872139 kubelet[1898]: E0209 10:30:03.872098 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:04.480613 kubelet[1898]: I0209 10:30:04.480573 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372028374247e+09 pod.CreationTimestamp="2024-02-09 10:29:56 +0000 UTC" firstStartedPulling="2024-02-09 10:29:56.856978065 +0000 UTC m=+50.387185015" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:30:04.47986797 +0000 UTC m=+58.010074920" watchObservedRunningTime="2024-02-09 10:30:04.480528593 +0000 UTC m=+58.010735543" Feb 9 10:30:04.522000 audit[3246]: NETFILTER_CFG table=filter:92 family=2 entries=18 op=nft_register_rule pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:04.522000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd04b2fd0 a2=0 a3=ffff95b4d6c0 items=0 ppid=2098 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:04.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:04.528000 audit[3246]: NETFILTER_CFG table=nat:93 family=2 entries=178 op=nft_register_chain pid=3246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 10:30:04.528000 audit[3246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffd04b2fd0 a2=0 a3=ffff95b4d6c0 items=0 ppid=2098 pid=3246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:04.528000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 10:30:04.873339 kubelet[1898]: E0209 10:30:04.873213 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:05.392671 env[1352]: time="2024-02-09T10:30:05.392621375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:05.398965 env[1352]: time="2024-02-09T10:30:05.398925300Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:05.403099 env[1352]: time="2024-02-09T10:30:05.403061660Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:05.407806 env[1352]: time="2024-02-09T10:30:05.407753180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:05.408363 env[1352]: time="2024-02-09T10:30:05.408329136Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 10:30:05.411093 env[1352]: time="2024-02-09T10:30:05.411042902Z" level=info msg="CreateContainer within sandbox \"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 10:30:05.440577 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1643130800.mount: Deactivated successfully. Feb 9 10:30:05.462263 env[1352]: time="2024-02-09T10:30:05.462214038Z" level=info msg="CreateContainer within sandbox \"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9cdc5660ada3e353e507a219eee1ec340fa9f451066d9e2a4dad6051dcf7fbed\"" Feb 9 10:30:05.463109 env[1352]: time="2024-02-09T10:30:05.463079632Z" level=info msg="StartContainer for \"9cdc5660ada3e353e507a219eee1ec340fa9f451066d9e2a4dad6051dcf7fbed\"" Feb 9 10:30:05.489589 systemd[1]: Started cri-containerd-9cdc5660ada3e353e507a219eee1ec340fa9f451066d9e2a4dad6051dcf7fbed.scope. Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3016 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646335363630616461336533353365353037613231396565653165 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit: BPF prog-id=108 op=LOAD Feb 9 10:30:05.504000 audit[3256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3016 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646335363630616461336533353365353037613231396565653165 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit: BPF prog-id=109 op=LOAD Feb 9 10:30:05.504000 audit[3256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3016 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646335363630616461336533353365353037613231396565653165 Feb 9 10:30:05.504000 audit: BPF prog-id=109 op=UNLOAD Feb 9 10:30:05.504000 audit: BPF prog-id=108 op=UNLOAD Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { perfmon } for pid=3256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit[3256]: AVC avc: denied { bpf } for pid=3256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:05.504000 audit: BPF prog-id=110 op=LOAD Feb 9 10:30:05.504000 audit[3256]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3016 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:05.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963646335363630616461336533353365353037613231396565653165 Feb 9 10:30:05.525153 systemd[1]: run-containerd-runc-k8s.io-9cdc5660ada3e353e507a219eee1ec340fa9f451066d9e2a4dad6051dcf7fbed-runc.HXXDq2.mount: Deactivated successfully. Feb 9 10:30:05.532211 env[1352]: time="2024-02-09T10:30:05.532158850Z" level=info msg="StartContainer for \"9cdc5660ada3e353e507a219eee1ec340fa9f451066d9e2a4dad6051dcf7fbed\" returns successfully" Feb 9 10:30:05.873860 kubelet[1898]: E0209 10:30:05.873823 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:05.943972 kubelet[1898]: I0209 10:30:05.943940 1898 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 10:30:05.943972 kubelet[1898]: I0209 10:30:05.943969 1898 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 10:30:06.495374 kubelet[1898]: I0209 10:30:06.495344 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-th2zs" podStartSLOduration=-9.223371989359465e+09 pod.CreationTimestamp="2024-02-09 10:29:19 +0000 UTC" firstStartedPulling="2024-02-09 10:29:56.676534078 +0000 UTC m=+50.206741028" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:30:06.494774013 +0000 UTC m=+60.024980963" watchObservedRunningTime="2024-02-09 10:30:06.495310296 +0000 UTC m=+60.025517206" Feb 9 10:30:06.832472 kubelet[1898]: E0209 10:30:06.832342 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:06.838858 env[1352]: time="2024-02-09T10:30:06.838814856Z" level=info msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" Feb 9 10:30:06.874550 kubelet[1898]: E0209 10:30:06.874503 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.875 [WARNING][3299] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--th2zs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d032e776-5142-4805-b328-e933689118b3", ResourceVersion:"1304", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a", Pod:"csi-node-driver-th2zs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid3d62a4a78d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.875 [INFO][3299] k8s.go 578: Cleaning up netns ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.875 [INFO][3299] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" iface="eth0" netns="" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.875 [INFO][3299] k8s.go 585: Releasing IP address(es) ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.875 [INFO][3299] utils.go 188: Calico CNI releasing IP address ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.892 [INFO][3305] ipam_plugin.go 415: Releasing address using handleID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.892 [INFO][3305] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.893 [INFO][3305] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.902 [WARNING][3305] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.902 [INFO][3305] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.903 [INFO][3305] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:06.905883 env[1352]: 2024-02-09 10:30:06.904 [INFO][3299] k8s.go 591: Teardown processing complete. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.906363 env[1352]: time="2024-02-09T10:30:06.905919676Z" level=info msg="TearDown network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" successfully" Feb 9 10:30:06.906363 env[1352]: time="2024-02-09T10:30:06.905949431Z" level=info msg="StopPodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" returns successfully" Feb 9 10:30:06.906574 env[1352]: time="2024-02-09T10:30:06.906544746Z" level=info msg="RemovePodSandbox for \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" Feb 9 10:30:06.906618 env[1352]: time="2024-02-09T10:30:06.906583141Z" level=info msg="Forcibly stopping sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\"" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.957 [WARNING][3324] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-csi--node--driver--th2zs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"d032e776-5142-4805-b328-e933689118b3", ResourceVersion:"1304", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"af5e4e1e9d2485564653dccd80c802b35be06641daf43857075c3b6646dbfb8a", Pod:"csi-node-driver-th2zs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid3d62a4a78d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.958 [INFO][3324] k8s.go 578: Cleaning up netns ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.958 [INFO][3324] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" iface="eth0" netns="" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.958 [INFO][3324] k8s.go 585: Releasing IP address(es) ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.958 [INFO][3324] utils.go 188: Calico CNI releasing IP address ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.974 [INFO][3332] ipam_plugin.go 415: Releasing address using handleID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.974 [INFO][3332] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.975 [INFO][3332] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.984 [WARNING][3332] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.984 [INFO][3332] ipam_plugin.go 443: Releasing address using workloadID ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" HandleID="k8s-pod-network.be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Workload="10.200.20.13-k8s-csi--node--driver--th2zs-eth0" Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.985 [INFO][3332] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:06.987734 env[1352]: 2024-02-09 10:30:06.986 [INFO][3324] k8s.go 591: Teardown processing complete. ContainerID="be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f" Feb 9 10:30:06.988178 env[1352]: time="2024-02-09T10:30:06.987770910Z" level=info msg="TearDown network for sandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" successfully" Feb 9 10:30:06.997444 env[1352]: time="2024-02-09T10:30:06.997388857Z" level=info msg="RemovePodSandbox \"be640c5fd6d81f70839dea4d5ec9f4a3bd48bec4f9648ed132bab7fb8134825f\" returns successfully" Feb 9 10:30:07.874915 kubelet[1898]: E0209 10:30:07.874882 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:08.876096 kubelet[1898]: E0209 10:30:08.876063 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:09.877547 kubelet[1898]: E0209 10:30:09.877506 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:10.878456 kubelet[1898]: E0209 10:30:10.878415 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:11.879179 kubelet[1898]: E0209 10:30:11.879144 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:12.880261 kubelet[1898]: E0209 10:30:12.880223 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:13.881294 kubelet[1898]: E0209 10:30:13.881258 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:14.882570 kubelet[1898]: E0209 10:30:14.882535 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:15.883488 kubelet[1898]: E0209 10:30:15.883452 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:16.884065 kubelet[1898]: E0209 10:30:16.884028 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:17.885377 kubelet[1898]: E0209 10:30:17.885328 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:18.886065 kubelet[1898]: E0209 10:30:18.886030 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:19.887118 kubelet[1898]: E0209 10:30:19.887077 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:20.888346 kubelet[1898]: E0209 10:30:20.888319 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:21.889782 kubelet[1898]: E0209 10:30:21.889748 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:22.702593 systemd[1]: run-containerd-runc-k8s.io-0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34-runc.ELZiik.mount: Deactivated successfully. Feb 9 10:30:22.890892 kubelet[1898]: E0209 10:30:22.890865 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:23.891609 kubelet[1898]: E0209 10:30:23.891575 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:24.892212 kubelet[1898]: E0209 10:30:24.892179 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:25.892397 kubelet[1898]: E0209 10:30:25.892369 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:26.831911 kubelet[1898]: E0209 10:30:26.831870 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:26.893288 kubelet[1898]: E0209 10:30:26.893261 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:27.894021 kubelet[1898]: E0209 10:30:27.893984 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:28.894678 kubelet[1898]: E0209 10:30:28.894644 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:29.894771 kubelet[1898]: E0209 10:30:29.894731 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:30.895647 kubelet[1898]: E0209 10:30:30.895595 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:31.896041 kubelet[1898]: E0209 10:30:31.896002 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:32.782472 kubelet[1898]: I0209 10:30:32.782421 1898 topology_manager.go:210] "Topology Admit Handler" Feb 9 10:30:32.786634 systemd[1]: Created slice kubepods-besteffort-pod4a72b987_ac9a_433e_aa52_c2ee72c266ad.slice. Feb 9 10:30:32.894590 kubelet[1898]: I0209 10:30:32.894556 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zsnjz\" (UniqueName: \"kubernetes.io/projected/4a72b987-ac9a-433e-aa52-c2ee72c266ad-kube-api-access-zsnjz\") pod \"test-pod-1\" (UID: \"4a72b987-ac9a-433e-aa52-c2ee72c266ad\") " pod="default/test-pod-1" Feb 9 10:30:32.894753 kubelet[1898]: I0209 10:30:32.894603 1898 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-67e91ce1-0d59-4ab4-8368-82183de4d489\" (UniqueName: \"kubernetes.io/nfs/4a72b987-ac9a-433e-aa52-c2ee72c266ad-pvc-67e91ce1-0d59-4ab4-8368-82183de4d489\") pod \"test-pod-1\" (UID: \"4a72b987-ac9a-433e-aa52-c2ee72c266ad\") " pod="default/test-pod-1" Feb 9 10:30:32.896633 kubelet[1898]: E0209 10:30:32.896613 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:33.189445 kernel: Failed to create system directory netfs Feb 9 10:30:33.189595 kernel: kauditd_printk_skb: 111 callbacks suppressed Feb 9 10:30:33.189624 kernel: audit: type=1400 audit(1707474633.177:809): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.189659 kernel: Failed to create system directory netfs Feb 9 10:30:33.177000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.177000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.214667 kernel: audit: type=1400 audit(1707474633.177:809): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.214744 kernel: Failed to create system directory netfs Feb 9 10:30:33.177000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.238734 kernel: audit: type=1400 audit(1707474633.177:809): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.238813 kernel: Failed to create system directory netfs Feb 9 10:30:33.260103 kernel: audit: type=1400 audit(1707474633.177:809): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.177000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.177000 audit[3403]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf5a135e0 a1=12c14 a2=aaaadefde028 a3=aaaaf5a04010 items=0 ppid=51 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.309459 kernel: audit: type=1300 audit(1707474633.177:809): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf5a135e0 a1=12c14 a2=aaaadefde028 a3=aaaaf5a04010 items=0 ppid=51 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.310766 kernel: audit: type=1327 audit(1707474633.177:809): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:30:33.177000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.392991 kernel: Failed to create system directory fscache Feb 9 10:30:33.393107 kernel: audit: type=1400 audit(1707474633.364:810): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.393164 kernel: Failed to create system directory fscache Feb 9 10:30:33.393181 kernel: audit: type=1400 audit(1707474633.364:810): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.445948 kernel: Failed to create system directory fscache Feb 9 10:30:33.446058 kernel: audit: type=1400 audit(1707474633.364:810): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.446081 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.469931 kernel: audit: type=1400 audit(1707474633.364:810): avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.470020 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.479518 kernel: Failed to create system directory fscache Feb 9 10:30:33.479567 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.489635 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.494465 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.501892 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.506635 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.513071 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.518343 kernel: Failed to create system directory fscache Feb 9 10:30:33.364000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.524303 kernel: Failed to create system directory fscache Feb 9 10:30:33.527778 kernel: FS-Cache: Loaded Feb 9 10:30:33.364000 audit[3403]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf5c26210 a1=4c344 a2=aaaadefde028 a3=aaaaf5a04010 items=0 ppid=51 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.364000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.653880 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.653942 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.653984 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.662534 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.662592 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.671214 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.671256 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.679938 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.680005 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.688411 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.688477 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.696687 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.701362 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.701422 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.709710 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.709752 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.718591 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.718679 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.728004 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.728098 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.736967 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.737052 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.745790 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.745866 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.755096 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.755136 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.764063 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.764124 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.772717 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.772785 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.783408 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.783481 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.792119 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.792180 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.800752 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.800815 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.809880 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.809940 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.818132 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.818213 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.826258 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.826320 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.834446 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.834504 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.843072 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.843113 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.851522 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.851569 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.860032 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.860096 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.867936 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.872530 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.872592 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.880447 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.880533 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.888262 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.888316 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.896011 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.896479 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.897649 kubelet[1898]: E0209 10:30:33.897628 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.904169 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.908398 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.912791 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.912844 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.920872 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.920938 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.928950 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.929021 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.937237 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.937299 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.941882 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.950161 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.950288 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.957928 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.958023 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.966135 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.966207 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.974212 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.974299 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.982043 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.982106 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.990070 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.990137 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.998288 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.998363 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.006211 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.006268 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.013787 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.018148 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.018223 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.025777 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.025841 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.035020 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.035097 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.042873 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.042931 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.051895 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.051962 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.060172 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.060230 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.070263 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.070327 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.078685 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.078755 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.086628 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.086667 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.094715 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.094753 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.102563 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.102615 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.110225 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.110258 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.118337 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.122606 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.122659 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.130595 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.130648 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.138286 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.138334 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.145811 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.145852 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.153086 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.153133 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.160585 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.160638 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.167975 kernel: Failed to create system directory sunrpc Feb 9 10:30:34.168021 kernel: Failed to create system directory sunrpc Feb 9 10:30:33.638000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.183651 kernel: RPC: Registered named UNIX socket transport module. Feb 9 10:30:34.183749 kernel: RPC: Registered udp transport module. Feb 9 10:30:34.183775 kernel: RPC: Registered tcp transport module. Feb 9 10:30:34.187416 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 10:30:33.638000 audit[3403]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf5c72560 a1=fbb6c a2=aaaadefde028 a3=aaaaf5a04010 items=6 ppid=51 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:33.638000 audit: CWD cwd="/" Feb 9 10:30:33.638000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PATH item=1 name=(null) inode=21969 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PATH item=2 name=(null) inode=21969 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PATH item=3 name=(null) inode=21970 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PATH item=4 name=(null) inode=21969 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PATH item=5 name=(null) inode=21971 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 10:30:33.638000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.310863 kernel: Failed to create system directory nfs Feb 9 10:30:34.310933 kernel: Failed to create system directory nfs Feb 9 10:30:34.310998 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.318180 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.321864 kernel: Failed to create system directory nfs Feb 9 10:30:34.321926 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.328888 kernel: Failed to create system directory nfs Feb 9 10:30:34.328931 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.335912 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.339414 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.342874 kernel: Failed to create system directory nfs Feb 9 10:30:34.342938 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.346470 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.353674 kernel: Failed to create system directory nfs Feb 9 10:30:34.353731 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.360797 kernel: Failed to create system directory nfs Feb 9 10:30:34.360874 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.367888 kernel: Failed to create system directory nfs Feb 9 10:30:34.367935 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.374842 kernel: Failed to create system directory nfs Feb 9 10:30:34.374892 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.381946 kernel: Failed to create system directory nfs Feb 9 10:30:34.382007 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.385543 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.392369 kernel: Failed to create system directory nfs Feb 9 10:30:34.392445 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.399356 kernel: Failed to create system directory nfs Feb 9 10:30:34.399387 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.406224 kernel: Failed to create system directory nfs Feb 9 10:30:34.406250 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.413547 kernel: Failed to create system directory nfs Feb 9 10:30:34.413606 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.420458 kernel: Failed to create system directory nfs Feb 9 10:30:34.420528 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.427768 kernel: Failed to create system directory nfs Feb 9 10:30:34.427800 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.434858 kernel: Failed to create system directory nfs Feb 9 10:30:34.434978 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.441977 kernel: Failed to create system directory nfs Feb 9 10:30:34.442054 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.445354 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.448878 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.456037 kernel: Failed to create system directory nfs Feb 9 10:30:34.456098 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.462973 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.467102 kernel: Failed to create system directory nfs Feb 9 10:30:34.467142 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.470558 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.473967 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.477389 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.484361 kernel: Failed to create system directory nfs Feb 9 10:30:34.484478 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.491459 kernel: Failed to create system directory nfs Feb 9 10:30:34.491551 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.495174 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.498684 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.505777 kernel: Failed to create system directory nfs Feb 9 10:30:34.505810 kernel: Failed to create system directory nfs Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.298000 audit[3403]: AVC avc: denied { confidentiality } for pid=3403 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.512782 kernel: Failed to create system directory nfs Feb 9 10:30:34.525500 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 10:30:34.298000 audit[3403]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf5d9eb40 a1=ae35c a2=aaaadefde028 a3=aaaaf5a04010 items=0 ppid=51 pid=3403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:34.298000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.593689 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.593778 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.593811 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.601057 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.601142 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.608283 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.608355 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.615511 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.615580 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.623031 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.623096 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.626682 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.633835 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.633886 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.641146 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.641209 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.644611 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.648296 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.655492 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.655525 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.663126 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.663211 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.670566 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.670667 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.677910 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.677989 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.684955 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.685027 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.688380 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.695794 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.695865 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.702828 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.702913 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.709900 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.709966 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.716924 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.716987 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.724047 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.724121 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.727789 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.731379 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.738407 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.738558 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.745695 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.749604 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.749685 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.753284 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.760216 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.760259 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.763679 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.767342 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.771546 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.778406 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.778471 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.781786 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.785335 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.793986 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.794078 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.801702 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.801781 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.809163 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.809203 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.812913 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.820834 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.820912 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.828334 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.828409 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.835692 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.835772 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.842709 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.842770 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.850033 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.854028 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.854106 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.857525 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.860957 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.864488 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.868173 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.871830 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.875399 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.878839 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.886239 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.886347 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.893141 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.893240 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.896625 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.898351 kubelet[1898]: E0209 10:30:34.898273 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:34.900326 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.907672 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.907726 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.911361 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.915355 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.919492 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.923396 kernel: Failed to create system directory nfs4 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.579000 audit[3408]: AVC avc: denied { confidentiality } for pid=3408 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:34.930903 kernel: Failed to create system directory nfs4 Feb 9 10:30:35.040682 kernel: NFS: Registering the id_resolver key type Feb 9 10:30:35.040819 kernel: Key type id_resolver registered Feb 9 10:30:35.040844 kernel: Key type id_legacy registered Feb 9 10:30:34.579000 audit[3408]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff921eb010 a1=167c04 a2=aaaad4ede028 a3=aaaae81e3010 items=0 ppid=51 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:34.579000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.072793 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.072875 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.072913 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.080836 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.084614 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.084663 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.092208 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.092326 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.099576 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.104285 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.108392 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.112955 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.113057 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.120976 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.121060 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.128604 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.128715 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.136774 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.136836 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.144455 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.144500 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.151742 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.151828 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.159234 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.159370 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.163092 kernel: Failed to create system directory rpcgss Feb 9 10:30:35.061000 audit[3409]: AVC avc: denied { confidentiality } for pid=3409 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 10:30:35.061000 audit[3409]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff847c3010 a1=3e09c a2=aaaabeade028 a3=aaaad0fea010 items=0 ppid=51 pid=3409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:35.061000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 10:30:35.569399 nfsidmap[3415]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-f964c266ce' Feb 9 10:30:35.578115 nfsidmap[3416]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-f964c266ce' Feb 9 10:30:35.586000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:30:35.586000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:30:35.586000 audit[1452]: AVC avc: denied { watch_reads } for pid=1452 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:30:35.586000 audit[1452]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad4134e30 a2=10 a3=0 items=0 ppid=1 pid=1452 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:35.586000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:30:35.586000 audit[1452]: AVC avc: denied { watch_reads } for pid=1452 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:30:35.586000 audit[1452]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad4134e30 a2=10 a3=0 items=0 ppid=1 pid=1452 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:35.586000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:30:35.586000 audit[1452]: AVC avc: denied { watch_reads } for pid=1452 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 10:30:35.586000 audit[1452]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad4134e30 a2=10 a3=0 items=0 ppid=1 pid=1452 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:35.586000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 10:30:35.789673 env[1352]: time="2024-02-09T10:30:35.789626717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4a72b987-ac9a-433e-aa52-c2ee72c266ad,Namespace:default,Attempt:0,}" Feb 9 10:30:35.899902 kubelet[1898]: E0209 10:30:35.899206 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:35.930643 systemd-networkd[1493]: cali5ec59c6bf6e: Link UP Feb 9 10:30:35.942986 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 10:30:35.943081 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 10:30:35.944702 systemd-networkd[1493]: cali5ec59c6bf6e: Gained carrier Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.869 [INFO][3418] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.13-k8s-test--pod--1-eth0 default 4a72b987-ac9a-433e-aa52-c2ee72c266ad 1370 0 2024-02-09 10:29:57 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.13 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.869 [INFO][3418] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.893 [INFO][3430] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" HandleID="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Workload="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.904 [INFO][3430] ipam_plugin.go 268: Auto assigning IP ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" HandleID="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Workload="10.200.20.13-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011a400), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.13", "pod":"test-pod-1", "timestamp":"2024-02-09 10:30:35.892986476 +0000 UTC"}, Hostname:"10.200.20.13", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.905 [INFO][3430] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.905 [INFO][3430] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.905 [INFO][3430] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.13' Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.906 [INFO][3430] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.909 [INFO][3430] ipam.go 372: Looking up existing affinities for host host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.912 [INFO][3430] ipam.go 489: Trying affinity for 192.168.98.64/26 host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.913 [INFO][3430] ipam.go 155: Attempting to load block cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.915 [INFO][3430] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.98.64/26 host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.915 [INFO][3430] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.98.64/26 handle="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.917 [INFO][3430] ipam.go 1682: Creating new handle: k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7 Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.920 [INFO][3430] ipam.go 1203: Writing block in order to claim IPs block=192.168.98.64/26 handle="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.925 [INFO][3430] ipam.go 1216: Successfully claimed IPs: [192.168.98.68/26] block=192.168.98.64/26 handle="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.925 [INFO][3430] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.98.68/26] handle="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" host="10.200.20.13" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.925 [INFO][3430] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.925 [INFO][3430] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.98.68/26] IPv6=[] ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" HandleID="k8s-pod-network.f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Workload="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.926 [INFO][3418] k8s.go 385: Populated endpoint ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4a72b987-ac9a-433e-aa52-c2ee72c266ad", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:35.954528 env[1352]: 2024-02-09 10:30:35.927 [INFO][3418] k8s.go 386: Calico CNI using IPs: [192.168.98.68/32] ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.955165 env[1352]: 2024-02-09 10:30:35.927 [INFO][3418] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.955165 env[1352]: 2024-02-09 10:30:35.944 [INFO][3418] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.955165 env[1352]: 2024-02-09 10:30:35.945 [INFO][3418] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.13-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"4a72b987-ac9a-433e-aa52-c2ee72c266ad", ResourceVersion:"1370", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 10, 29, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.13", ContainerID:"f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.98.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"fe:74:3e:2d:08:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 10:30:35.955165 env[1352]: 2024-02-09 10:30:35.950 [INFO][3418] k8s.go 491: Wrote updated endpoint to datastore ContainerID="f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.13-k8s-test--pod--1-eth0" Feb 9 10:30:35.961000 audit[3447]: NETFILTER_CFG table=filter:94 family=2 entries=38 op=nft_register_chain pid=3447 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 10:30:35.961000 audit[3447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19080 a0=3 a1=fffff90d35e0 a2=0 a3=ffff975c3fa8 items=0 ppid=2613 pid=3447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:35.961000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 10:30:35.970689 env[1352]: time="2024-02-09T10:30:35.970609635Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 10:30:35.971484 env[1352]: time="2024-02-09T10:30:35.970651471Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 10:30:35.971484 env[1352]: time="2024-02-09T10:30:35.970661990Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 10:30:35.971484 env[1352]: time="2024-02-09T10:30:35.970859530Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7 pid=3459 runtime=io.containerd.runc.v2 Feb 9 10:30:35.993866 systemd[1]: Started cri-containerd-f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7.scope. Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.005000 audit: BPF prog-id=111 op=LOAD Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3459 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646433313338653938396333363636613866623165366333643962 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3459 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646433313338653938396333363636613866623165366333643962 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.006000 audit: BPF prog-id=112 op=LOAD Feb 9 10:30:36.006000 audit[3469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3459 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646433313338653938396333363636613866623165366333643962 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.007000 audit: BPF prog-id=113 op=LOAD Feb 9 10:30:36.007000 audit[3469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3459 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646433313338653938396333363636613866623165366333643962 Feb 9 10:30:36.008000 audit: BPF prog-id=113 op=UNLOAD Feb 9 10:30:36.008000 audit: BPF prog-id=112 op=UNLOAD Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { perfmon } for pid=3469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit[3469]: AVC avc: denied { bpf } for pid=3469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.008000 audit: BPF prog-id=114 op=LOAD Feb 9 10:30:36.008000 audit[3469]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3459 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637646433313338653938396333363636613866623165366333643962 Feb 9 10:30:36.036400 env[1352]: time="2024-02-09T10:30:36.036354447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:4a72b987-ac9a-433e-aa52-c2ee72c266ad,Namespace:default,Attempt:0,} returns sandbox id \"f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7\"" Feb 9 10:30:36.038602 env[1352]: time="2024-02-09T10:30:36.038557430Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 10:30:36.415278 env[1352]: time="2024-02-09T10:30:36.415229621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:36.423193 env[1352]: time="2024-02-09T10:30:36.423147960Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:36.426792 env[1352]: time="2024-02-09T10:30:36.426752605Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:36.433725 env[1352]: time="2024-02-09T10:30:36.433681042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 10:30:36.434390 env[1352]: time="2024-02-09T10:30:36.434360575Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 10:30:36.436524 env[1352]: time="2024-02-09T10:30:36.436493365Z" level=info msg="CreateContainer within sandbox \"f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 10:30:36.474494 env[1352]: time="2024-02-09T10:30:36.474421506Z" level=info msg="CreateContainer within sandbox \"f7dd3138e989c3666a8fb1e6c3d9bacc1b4300299bcd7f42808a6c90ccd19ab7\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"12241d45ef4d4c8da9403905ba37dc0f34aafdb38218a6aa95b644c4caa00915\"" Feb 9 10:30:36.475592 env[1352]: time="2024-02-09T10:30:36.475564714Z" level=info msg="StartContainer for \"12241d45ef4d4c8da9403905ba37dc0f34aafdb38218a6aa95b644c4caa00915\"" Feb 9 10:30:36.490503 systemd[1]: Started cri-containerd-12241d45ef4d4c8da9403905ba37dc0f34aafdb38218a6aa95b644c4caa00915.scope. Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.505000 audit: BPF prog-id=115 op=LOAD Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3459 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132323431643435656634643463386461393430333930356261333764 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3459 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132323431643435656634643463386461393430333930356261333764 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.506000 audit: BPF prog-id=116 op=LOAD Feb 9 10:30:36.506000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3459 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132323431643435656634643463386461393430333930356261333764 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.507000 audit: BPF prog-id=117 op=LOAD Feb 9 10:30:36.507000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3459 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132323431643435656634643463386461393430333930356261333764 Feb 9 10:30:36.507000 audit: BPF prog-id=117 op=UNLOAD Feb 9 10:30:36.508000 audit: BPF prog-id=116 op=UNLOAD Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { perfmon } for pid=3498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit[3498]: AVC avc: denied { bpf } for pid=3498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 10:30:36.508000 audit: BPF prog-id=118 op=LOAD Feb 9 10:30:36.508000 audit[3498]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3459 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 10:30:36.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132323431643435656634643463386461393430333930356261333764 Feb 9 10:30:36.649670 env[1352]: time="2024-02-09T10:30:36.648809077Z" level=info msg="StartContainer for \"12241d45ef4d4c8da9403905ba37dc0f34aafdb38218a6aa95b644c4caa00915\" returns successfully" Feb 9 10:30:36.669330 kubelet[1898]: I0209 10:30:36.669220 1898 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.2233719971856e+09 pod.CreationTimestamp="2024-02-09 10:29:57 +0000 UTC" firstStartedPulling="2024-02-09 10:30:36.037887376 +0000 UTC m=+89.568094326" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 10:30:36.668706555 +0000 UTC m=+90.198913505" watchObservedRunningTime="2024-02-09 10:30:36.669175069 +0000 UTC m=+90.199382019" Feb 9 10:30:36.899411 kubelet[1898]: E0209 10:30:36.899329 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:37.229616 systemd-networkd[1493]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 10:30:37.900116 kubelet[1898]: E0209 10:30:37.900083 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:38.901241 kubelet[1898]: E0209 10:30:38.901193 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:39.902076 kubelet[1898]: E0209 10:30:39.902036 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:40.902414 kubelet[1898]: E0209 10:30:40.902373 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:41.903012 kubelet[1898]: E0209 10:30:41.902971 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:42.903568 kubelet[1898]: E0209 10:30:42.903520 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:43.903659 kubelet[1898]: E0209 10:30:43.903621 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:44.904246 kubelet[1898]: E0209 10:30:44.904206 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:45.905014 kubelet[1898]: E0209 10:30:45.904975 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:46.832484 kubelet[1898]: E0209 10:30:46.832448 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:46.906085 kubelet[1898]: E0209 10:30:46.906059 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:47.906756 kubelet[1898]: E0209 10:30:47.906716 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:48.907694 kubelet[1898]: E0209 10:30:48.907649 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:49.907981 kubelet[1898]: E0209 10:30:49.907946 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:50.909086 kubelet[1898]: E0209 10:30:50.909045 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:51.910117 kubelet[1898]: E0209 10:30:51.909901 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:52.910801 kubelet[1898]: E0209 10:30:52.910755 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:53.911825 kubelet[1898]: E0209 10:30:53.911779 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:54.684751 kubelet[1898]: E0209 10:30:54.684702 1898 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.12:56116->10.200.20.10:2379: read: connection timed out Feb 9 10:30:54.912935 kubelet[1898]: E0209 10:30:54.912904 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:55.913902 kubelet[1898]: E0209 10:30:55.913872 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:56.915220 kubelet[1898]: E0209 10:30:56.915164 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:57.915627 kubelet[1898]: E0209 10:30:57.915588 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:58.915969 kubelet[1898]: E0209 10:30:58.915938 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:30:59.916944 kubelet[1898]: E0209 10:30:59.916910 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:00.918088 kubelet[1898]: E0209 10:31:00.918058 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:01.918606 kubelet[1898]: E0209 10:31:01.918561 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:02.919727 kubelet[1898]: E0209 10:31:02.919695 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:03.921118 kubelet[1898]: E0209 10:31:03.921077 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:04.685119 kubelet[1898]: E0209 10:31:04.685056 1898 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:04.922188 kubelet[1898]: E0209 10:31:04.922156 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:05.923046 kubelet[1898]: E0209 10:31:05.923007 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:06.628114 update_engine[1343]: I0209 10:31:06.627707 1343 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 10:31:06.628114 update_engine[1343]: I0209 10:31:06.627758 1343 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 10:31:06.628114 update_engine[1343]: I0209 10:31:06.627936 1343 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 10:31:06.629010 update_engine[1343]: I0209 10:31:06.628783 1343 omaha_request_params.cc:62] Current group set to lts Feb 9 10:31:06.629010 update_engine[1343]: I0209 10:31:06.628885 1343 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 10:31:06.629010 update_engine[1343]: I0209 10:31:06.628890 1343 update_attempter.cc:643] Scheduling an action processor start. Feb 9 10:31:06.629010 update_engine[1343]: I0209 10:31:06.628906 1343 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:31:06.629010 update_engine[1343]: I0209 10:31:06.628927 1343 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 10:31:06.629189 locksmithd[1427]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 10:31:06.647761 update_engine[1343]: I0209 10:31:06.647727 1343 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:31:06.647761 update_engine[1343]: I0209 10:31:06.647753 1343 omaha_request_action.cc:271] Request: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: Feb 9 10:31:06.647761 update_engine[1343]: I0209 10:31:06.647759 1343 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:31:06.648663 update_engine[1343]: I0209 10:31:06.648639 1343 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:31:06.648871 update_engine[1343]: I0209 10:31:06.648852 1343 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 10:31:06.694680 update_engine[1343]: E0209 10:31:06.694638 1343 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:31:06.694811 update_engine[1343]: I0209 10:31:06.694783 1343 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 10:31:06.831772 kubelet[1898]: E0209 10:31:06.831744 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:06.923570 kubelet[1898]: E0209 10:31:06.923538 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:07.923804 kubelet[1898]: E0209 10:31:07.923772 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:08.924882 kubelet[1898]: E0209 10:31:08.924844 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:09.925307 kubelet[1898]: E0209 10:31:09.925266 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:10.926075 kubelet[1898]: E0209 10:31:10.926042 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:11.926938 kubelet[1898]: E0209 10:31:11.926904 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:12.928043 kubelet[1898]: E0209 10:31:12.928014 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:13.929208 kubelet[1898]: E0209 10:31:13.929171 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:14.686514 kubelet[1898]: E0209 10:31:14.686474 1898 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:14.929514 kubelet[1898]: E0209 10:31:14.929474 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:15.930590 kubelet[1898]: E0209 10:31:15.930561 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:16.608547 update_engine[1343]: I0209 10:31:16.608505 1343 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:31:16.608862 update_engine[1343]: I0209 10:31:16.608696 1343 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:31:16.608951 update_engine[1343]: I0209 10:31:16.608891 1343 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 10:31:16.714811 update_engine[1343]: E0209 10:31:16.714777 1343 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:31:16.714932 update_engine[1343]: I0209 10:31:16.714879 1343 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 10:31:16.931595 kubelet[1898]: E0209 10:31:16.931556 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:17.932326 kubelet[1898]: E0209 10:31:17.932289 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:18.932739 kubelet[1898]: E0209 10:31:18.932709 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:19.934041 kubelet[1898]: E0209 10:31:19.934006 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:20.935074 kubelet[1898]: E0209 10:31:20.935031 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:21.935213 kubelet[1898]: E0209 10:31:21.935137 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:22.701946 systemd[1]: run-containerd-runc-k8s.io-0a024625a69a47ddc52eeeb090d80d7f36845ca1916a033a18f0d7d1eeee2b34-runc.Y2hsc1.mount: Deactivated successfully. Feb 9 10:31:22.936563 kubelet[1898]: E0209 10:31:22.936481 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:23.936716 kubelet[1898]: E0209 10:31:23.936679 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:24.687670 kubelet[1898]: E0209 10:31:24.687615 1898 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:24.937178 kubelet[1898]: E0209 10:31:24.937139 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:25.938124 kubelet[1898]: E0209 10:31:25.938085 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:26.609340 update_engine[1343]: I0209 10:31:26.609247 1343 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:31:26.609677 update_engine[1343]: I0209 10:31:26.609455 1343 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:31:26.609677 update_engine[1343]: I0209 10:31:26.609643 1343 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 10:31:26.715803 update_engine[1343]: E0209 10:31:26.715765 1343 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:31:26.715940 update_engine[1343]: I0209 10:31:26.715866 1343 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Feb 9 10:31:26.832444 kubelet[1898]: E0209 10:31:26.832388 1898 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:26.939103 kubelet[1898]: E0209 10:31:26.939076 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:27.939476 kubelet[1898]: E0209 10:31:27.939444 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:28.940958 kubelet[1898]: E0209 10:31:28.940926 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:29.942298 kubelet[1898]: E0209 10:31:29.942268 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:30.943138 kubelet[1898]: E0209 10:31:30.943107 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:31.944493 kubelet[1898]: E0209 10:31:31.944463 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:32.165613 kubelet[1898]: E0209 10:31:32.165581 1898 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.13\": Get \"https://10.200.20.12:6443/api/v1/nodes/10.200.20.13?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 10:31:32.944786 kubelet[1898]: E0209 10:31:32.944735 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:33.945054 kubelet[1898]: E0209 10:31:33.945016 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:34.688058 kubelet[1898]: E0209 10:31:34.688008 1898 controller.go:189] failed to update lease, error: Put "https://10.200.20.12:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.13?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 10:31:34.688058 kubelet[1898]: I0209 10:31:34.688061 1898 controller.go:116] failed to update lease using latest lease, fallback to ensure lease, err: failed 5 attempts to update lease Feb 9 10:31:34.945329 kubelet[1898]: E0209 10:31:34.945230 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:35.946794 kubelet[1898]: E0209 10:31:35.946759 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:36.609083 update_engine[1343]: I0209 10:31:36.608683 1343 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:31:36.609083 update_engine[1343]: I0209 10:31:36.608866 1343 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:31:36.609083 update_engine[1343]: I0209 10:31:36.609047 1343 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 10:31:36.711465 update_engine[1343]: E0209 10:31:36.710772 1343 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710868 1343 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710873 1343 omaha_request_action.cc:621] Omaha request response: Feb 9 10:31:36.711465 update_engine[1343]: E0209 10:31:36.710961 1343 omaha_request_action.cc:640] Omaha request network transfer failed. Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710975 1343 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710978 1343 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710981 1343 update_attempter.cc:306] Processing Done. Feb 9 10:31:36.711465 update_engine[1343]: E0209 10:31:36.710994 1343 update_attempter.cc:619] Update failed. Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.710997 1343 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.711000 1343 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.711004 1343 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.711066 1343 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.711086 1343 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 10:31:36.711465 update_engine[1343]: I0209 10:31:36.711088 1343 omaha_request_action.cc:271] Request: Feb 9 10:31:36.711465 update_engine[1343]: Feb 9 10:31:36.711465 update_engine[1343]: Feb 9 10:31:36.711465 update_engine[1343]: Feb 9 10:31:36.712008 update_engine[1343]: Feb 9 10:31:36.712008 update_engine[1343]: Feb 9 10:31:36.712008 update_engine[1343]: Feb 9 10:31:36.712008 update_engine[1343]: I0209 10:31:36.711092 1343 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 10:31:36.712008 update_engine[1343]: I0209 10:31:36.711199 1343 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 10:31:36.712008 update_engine[1343]: I0209 10:31:36.711361 1343 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 10:31:36.712130 locksmithd[1427]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Feb 9 10:31:36.772874 update_engine[1343]: E0209 10:31:36.772826 1343 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772965 1343 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772975 1343 omaha_request_action.cc:621] Omaha request response: Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772984 1343 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772986 1343 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772989 1343 update_attempter.cc:306] Processing Done. Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.772992 1343 update_attempter.cc:310] Error event sent. Feb 9 10:31:36.773017 update_engine[1343]: I0209 10:31:36.773000 1343 update_check_scheduler.cc:74] Next update check in 49m41s Feb 9 10:31:36.773311 locksmithd[1427]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Feb 9 10:31:36.947083 kubelet[1898]: E0209 10:31:36.947060 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:37.948055 kubelet[1898]: E0209 10:31:37.948023 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:38.949130 kubelet[1898]: E0209 10:31:38.949093 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:39.009449 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.024449 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.039577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.055437 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.069767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.085067 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.085349 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.108211 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.108404 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.108549 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.123827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.124015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.139373 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.147013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.147170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.162389 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.169838 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.169996 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.184963 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.201201 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.201413 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.201559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.217397 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.217656 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.240912 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.241179 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.248771 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.257062 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.257481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.272717 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.280797 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.281080 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.296584 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.296800 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.311932 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.312146 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.327073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.327325 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.342238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.342505 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.357482 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.357695 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.372831 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.381014 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.381198 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.396483 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.396710 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.411990 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.419880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.439450 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.439576 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.439678 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.450375 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.458918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.466880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.474966 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.482698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.494684 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.494810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.505944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.506168 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.521257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.528997 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.536748 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.544451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.567901 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.583344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.606624 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619107 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619239 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619468 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619575 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619674 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.619770 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.639667 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.639942 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.640052 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.656415 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.664381 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.688074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.688184 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.688278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.696095 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.696322 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.713599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.737033 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.737298 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.737409 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.738395 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.753465 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.761597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.761819 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.777528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.785663 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.793981 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.794253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.804508 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.820894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.821227 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.837705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.838006 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.856127 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.875029 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.891636 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.891746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.891840 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.917142 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.917407 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.917551 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.927300 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.927533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.935340 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.949836 kubelet[1898]: E0209 10:31:39.949763 1898 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 10:31:39.951374 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.951600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.968753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.969049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.992257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.992528 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:39.992651 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.001073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.017621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#32 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.017924 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#120 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.025919 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#121 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.034115 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#123 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.042382 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#64 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.050958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#65 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.059763 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#66 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.067976 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#67 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.076210 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#68 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.084318 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#69 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.092515 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#70 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.100599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#71 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.108380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#72 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.116015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#74 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.124294 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#73 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.132252 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#76 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.140582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#75 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.148301 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#77 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.156234 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#78 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.164166 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#79 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.171892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#80 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.179604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#82 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.187418 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#81 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.195164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#83 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.203884 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#84 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.211918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#85 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.221162 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#86 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.229147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#88 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.236902 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#87 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.244886 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#89 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.252706 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#90 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.260594 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.268463 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#92 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.276238 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#93 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.284150 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#94 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.292178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#95 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.300135 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#96 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.307863 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#97 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.315713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#98 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.323335 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#99 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.331073 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#100 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.339206 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#101 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.346949 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#102 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.364236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#103 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.364501 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#105 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.374040 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#104 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.382549 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#106 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.390542 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#107 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.398604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#108 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.406608 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#109 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.414812 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#110 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.423822 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#111 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.433004 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#112 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 10:31:40.441842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#113 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001