Feb 9 18:34:51.080006 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:34:51.080024 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:34:51.080032 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 18:34:51.080039 kernel: printk: bootconsole [pl11] enabled Feb 9 18:34:51.080044 kernel: efi: EFI v2.70 by EDK II Feb 9 18:34:51.080049 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 18:34:51.080055 kernel: random: crng init done Feb 9 18:34:51.080061 kernel: ACPI: Early table checksum verification disabled Feb 9 18:34:51.080066 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 18:34:51.080072 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080077 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080083 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 18:34:51.080089 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080094 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080101 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080107 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080113 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080119 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080125 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 18:34:51.080131 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:34:51.080156 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 18:34:51.080162 kernel: NUMA: Failed to initialise from firmware Feb 9 18:34:51.080168 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:34:51.080173 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 9 18:34:51.080179 kernel: Zone ranges: Feb 9 18:34:51.080185 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 18:34:51.080190 kernel: DMA32 empty Feb 9 18:34:51.080197 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:34:51.080203 kernel: Movable zone start for each node Feb 9 18:34:51.080208 kernel: Early memory node ranges Feb 9 18:34:51.080214 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 18:34:51.080220 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 18:34:51.080226 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 18:34:51.080231 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 18:34:51.080237 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 18:34:51.080242 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 18:34:51.080248 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 18:34:51.080254 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 18:34:51.080259 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:34:51.080266 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:34:51.080275 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 18:34:51.080281 kernel: psci: probing for conduit method from ACPI. Feb 9 18:34:51.080287 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:34:51.080293 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:34:51.080300 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 18:34:51.080306 kernel: psci: SMC Calling Convention v1.4 Feb 9 18:34:51.080313 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 18:34:51.080319 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 18:34:51.080325 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:34:51.080331 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:34:51.080337 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 18:34:51.080343 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:34:51.080349 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:34:51.080355 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:34:51.080361 kernel: CPU features: detected: Spectre-BHB Feb 9 18:34:51.080367 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:34:51.080374 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:34:51.080380 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:34:51.080386 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 18:34:51.080392 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 18:34:51.080398 kernel: Policy zone: Normal Feb 9 18:34:51.080405 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:34:51.080412 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:34:51.080418 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:34:51.080424 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:34:51.080430 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:34:51.080438 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 18:34:51.080445 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 9 18:34:51.080451 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:34:51.080457 kernel: trace event string verifier disabled Feb 9 18:34:51.080463 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:34:51.080469 kernel: rcu: RCU event tracing is enabled. Feb 9 18:34:51.080476 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:34:51.080482 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:34:51.080488 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:34:51.080494 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:34:51.080500 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:34:51.080507 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:34:51.080514 kernel: GICv3: 960 SPIs implemented Feb 9 18:34:51.080520 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:34:51.080526 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:34:51.080532 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:34:51.080538 kernel: GICv3: 16 PPIs implemented Feb 9 18:34:51.080544 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 18:34:51.080550 kernel: ITS: No ITS available, not enabling LPIs Feb 9 18:34:51.080556 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:34:51.080562 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:34:51.080568 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:34:51.080574 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:34:51.080582 kernel: Console: colour dummy device 80x25 Feb 9 18:34:51.080588 kernel: printk: console [tty1] enabled Feb 9 18:34:51.080594 kernel: ACPI: Core revision 20210730 Feb 9 18:34:51.080601 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:34:51.080607 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:34:51.080613 kernel: LSM: Security Framework initializing Feb 9 18:34:51.080619 kernel: SELinux: Initializing. Feb 9 18:34:51.080626 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:34:51.080632 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:34:51.080639 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 18:34:51.080646 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 18:34:51.080652 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:34:51.080658 kernel: Remapping and enabling EFI services. Feb 9 18:34:51.080664 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:34:51.080670 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:34:51.080677 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 18:34:51.080683 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:34:51.080689 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:34:51.080697 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:34:51.080704 kernel: SMP: Total of 2 processors activated. Feb 9 18:34:51.080710 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:34:51.080716 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 18:34:51.080723 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:34:51.080729 kernel: CPU features: detected: CRC32 instructions Feb 9 18:34:51.080735 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:34:51.080741 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:34:51.080748 kernel: CPU features: detected: Privileged Access Never Feb 9 18:34:51.080755 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:34:51.080761 kernel: alternatives: patching kernel code Feb 9 18:34:51.080772 kernel: devtmpfs: initialized Feb 9 18:34:51.080780 kernel: KASLR enabled Feb 9 18:34:51.080786 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:34:51.080793 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:34:51.080800 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:34:51.080806 kernel: SMBIOS 3.1.0 present. Feb 9 18:34:51.080813 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 18:34:51.080819 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:34:51.080827 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:34:51.080834 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:34:51.080841 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:34:51.080847 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:34:51.080854 kernel: audit: type=2000 audit(0.098:1): state=initialized audit_enabled=0 res=1 Feb 9 18:34:51.080860 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:34:51.080867 kernel: cpuidle: using governor menu Feb 9 18:34:51.080875 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:34:51.080881 kernel: ASID allocator initialised with 32768 entries Feb 9 18:34:51.080888 kernel: ACPI: bus type PCI registered Feb 9 18:34:51.080894 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:34:51.080901 kernel: Serial: AMBA PL011 UART driver Feb 9 18:34:51.080908 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:34:51.080914 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:34:51.080921 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:34:51.080927 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:34:51.080935 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:34:51.080941 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:34:51.080948 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:34:51.080955 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:34:51.080961 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:34:51.080968 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:34:51.080974 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:34:51.080981 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:34:51.080987 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:34:51.080995 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:34:51.081001 kernel: ACPI: Interpreter enabled Feb 9 18:34:51.081008 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:34:51.081015 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:34:51.081021 kernel: printk: console [ttyAMA0] enabled Feb 9 18:34:51.081028 kernel: printk: bootconsole [pl11] disabled Feb 9 18:34:51.081034 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 18:34:51.081041 kernel: iommu: Default domain type: Translated Feb 9 18:34:51.081047 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:34:51.081055 kernel: vgaarb: loaded Feb 9 18:34:51.081062 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:34:51.081068 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:34:51.081075 kernel: PTP clock support registered Feb 9 18:34:51.081081 kernel: Registered efivars operations Feb 9 18:34:51.081088 kernel: No ACPI PMU IRQ for CPU0 Feb 9 18:34:51.081094 kernel: No ACPI PMU IRQ for CPU1 Feb 9 18:34:51.081101 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:34:51.081107 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:34:51.081115 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:34:51.081121 kernel: pnp: PnP ACPI init Feb 9 18:34:51.081128 kernel: pnp: PnP ACPI: found 0 devices Feb 9 18:34:51.098392 kernel: NET: Registered PF_INET protocol family Feb 9 18:34:51.098414 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:34:51.098422 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:34:51.098429 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:34:51.098436 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:34:51.098443 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:34:51.098457 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:34:51.098464 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:34:51.098471 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:34:51.098478 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:34:51.098484 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:34:51.098491 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 18:34:51.098498 kernel: kvm [1]: HYP mode not available Feb 9 18:34:51.098505 kernel: Initialise system trusted keyrings Feb 9 18:34:51.098512 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:34:51.098521 kernel: Key type asymmetric registered Feb 9 18:34:51.098528 kernel: Asymmetric key parser 'x509' registered Feb 9 18:34:51.098535 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:34:51.098542 kernel: io scheduler mq-deadline registered Feb 9 18:34:51.098549 kernel: io scheduler kyber registered Feb 9 18:34:51.098555 kernel: io scheduler bfq registered Feb 9 18:34:51.098562 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:34:51.098569 kernel: thunder_xcv, ver 1.0 Feb 9 18:34:51.098575 kernel: thunder_bgx, ver 1.0 Feb 9 18:34:51.098584 kernel: nicpf, ver 1.0 Feb 9 18:34:51.098590 kernel: nicvf, ver 1.0 Feb 9 18:34:51.098727 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:34:51.098788 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:34:50 UTC (1707503690) Feb 9 18:34:51.098798 kernel: efifb: probing for efifb Feb 9 18:34:51.098805 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 18:34:51.098812 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 18:34:51.098818 kernel: efifb: scrolling: redraw Feb 9 18:34:51.098827 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 18:34:51.098834 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:34:51.098841 kernel: fb0: EFI VGA frame buffer device Feb 9 18:34:51.098848 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 18:34:51.098855 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:34:51.098862 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:34:51.098868 kernel: Segment Routing with IPv6 Feb 9 18:34:51.098875 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:34:51.098882 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:34:51.098898 kernel: Key type dns_resolver registered Feb 9 18:34:51.098905 kernel: registered taskstats version 1 Feb 9 18:34:51.098912 kernel: Loading compiled-in X.509 certificates Feb 9 18:34:51.098919 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:34:51.098925 kernel: Key type .fscrypt registered Feb 9 18:34:51.098932 kernel: Key type fscrypt-provisioning registered Feb 9 18:34:51.098939 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:34:51.098945 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:34:51.098952 kernel: ima: No architecture policies found Feb 9 18:34:51.098960 kernel: Freeing unused kernel memory: 34688K Feb 9 18:34:51.098967 kernel: Run /init as init process Feb 9 18:34:51.098973 kernel: with arguments: Feb 9 18:34:51.098980 kernel: /init Feb 9 18:34:51.098986 kernel: with environment: Feb 9 18:34:51.098993 kernel: HOME=/ Feb 9 18:34:51.098999 kernel: TERM=linux Feb 9 18:34:51.099006 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:34:51.099015 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:34:51.099026 systemd[1]: Detected virtualization microsoft. Feb 9 18:34:51.099033 systemd[1]: Detected architecture arm64. Feb 9 18:34:51.099040 systemd[1]: Running in initrd. Feb 9 18:34:51.099047 systemd[1]: No hostname configured, using default hostname. Feb 9 18:34:51.099054 systemd[1]: Hostname set to . Feb 9 18:34:51.099061 systemd[1]: Initializing machine ID from random generator. Feb 9 18:34:51.099068 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:34:51.099077 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:34:51.099084 systemd[1]: Reached target cryptsetup.target. Feb 9 18:34:51.099091 systemd[1]: Reached target paths.target. Feb 9 18:34:51.099098 systemd[1]: Reached target slices.target. Feb 9 18:34:51.099105 systemd[1]: Reached target swap.target. Feb 9 18:34:51.099112 systemd[1]: Reached target timers.target. Feb 9 18:34:51.099119 systemd[1]: Listening on iscsid.socket. Feb 9 18:34:51.099126 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:34:51.099147 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:34:51.099155 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:34:51.099163 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:34:51.099170 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:34:51.099177 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:34:51.099184 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:34:51.099191 systemd[1]: Reached target sockets.target. Feb 9 18:34:51.099198 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:34:51.099205 systemd[1]: Finished network-cleanup.service. Feb 9 18:34:51.099214 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:34:51.099222 systemd[1]: Starting systemd-journald.service... Feb 9 18:34:51.099229 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:34:51.099236 systemd[1]: Starting systemd-resolved.service... Feb 9 18:34:51.099243 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:34:51.099250 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:34:51.099261 systemd-journald[276]: Journal started Feb 9 18:34:51.099306 systemd-journald[276]: Runtime Journal (/run/log/journal/c691447de3c347bdbffdceb8810aff68) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:34:51.066494 systemd-modules-load[277]: Inserted module 'overlay' Feb 9 18:34:51.114855 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 9 18:34:51.122784 kernel: Bridge firewalling registered Feb 9 18:34:51.115090 systemd-resolved[278]: Positive Trust Anchors: Feb 9 18:34:51.115097 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:34:51.115125 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:34:51.209032 kernel: SCSI subsystem initialized Feb 9 18:34:51.209057 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:34:51.209068 systemd[1]: Started systemd-journald.service. Feb 9 18:34:51.209080 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:34:51.117208 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 9 18:34:51.225240 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:34:51.224210 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 9 18:34:51.287252 kernel: audit: type=1130 audit(1707503691.230:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.287276 kernel: audit: type=1130 audit(1707503691.257:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.230588 systemd[1]: Started systemd-resolved.service. Feb 9 18:34:51.258227 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:34:51.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.292395 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:34:51.345255 kernel: audit: type=1130 audit(1707503691.291:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.345287 kernel: audit: type=1130 audit(1707503691.322:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.322932 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:34:51.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.351121 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:34:51.405514 kernel: audit: type=1130 audit(1707503691.350:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.405536 kernel: audit: type=1130 audit(1707503691.381:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.381798 systemd[1]: Reached target nss-lookup.target. Feb 9 18:34:51.415398 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:34:51.422011 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:34:51.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.427276 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:34:51.479431 kernel: audit: type=1130 audit(1707503691.449:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.443660 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:34:51.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.473852 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:34:51.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.484638 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:34:51.553313 kernel: audit: type=1130 audit(1707503691.484:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.553339 kernel: audit: type=1130 audit(1707503691.514:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.519815 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:34:51.561042 dracut-cmdline[298]: dracut-dracut-053 Feb 9 18:34:51.566674 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:34:51.623158 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:34:51.635161 kernel: iscsi: registered transport (tcp) Feb 9 18:34:51.655549 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:34:51.655603 kernel: QLogic iSCSI HBA Driver Feb 9 18:34:51.690783 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:34:51.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:51.696851 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:34:51.755161 kernel: raid6: neonx8 gen() 13798 MB/s Feb 9 18:34:51.773150 kernel: raid6: neonx8 xor() 10815 MB/s Feb 9 18:34:51.794150 kernel: raid6: neonx4 gen() 13532 MB/s Feb 9 18:34:51.816145 kernel: raid6: neonx4 xor() 11227 MB/s Feb 9 18:34:51.837143 kernel: raid6: neonx2 gen() 13110 MB/s Feb 9 18:34:51.858144 kernel: raid6: neonx2 xor() 10299 MB/s Feb 9 18:34:51.880144 kernel: raid6: neonx1 gen() 10500 MB/s Feb 9 18:34:51.901145 kernel: raid6: neonx1 xor() 8800 MB/s Feb 9 18:34:51.922148 kernel: raid6: int64x8 gen() 6290 MB/s Feb 9 18:34:51.944146 kernel: raid6: int64x8 xor() 3548 MB/s Feb 9 18:34:51.965147 kernel: raid6: int64x4 gen() 7255 MB/s Feb 9 18:34:51.986148 kernel: raid6: int64x4 xor() 3852 MB/s Feb 9 18:34:52.008146 kernel: raid6: int64x2 gen() 6147 MB/s Feb 9 18:34:52.029146 kernel: raid6: int64x2 xor() 3317 MB/s Feb 9 18:34:52.051151 kernel: raid6: int64x1 gen() 5040 MB/s Feb 9 18:34:52.076359 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 18:34:52.076379 kernel: raid6: using algorithm neonx8 gen() 13798 MB/s Feb 9 18:34:52.076396 kernel: raid6: .... xor() 10815 MB/s, rmw enabled Feb 9 18:34:52.081036 kernel: raid6: using neon recovery algorithm Feb 9 18:34:52.106220 kernel: xor: measuring software checksum speed Feb 9 18:34:52.106234 kernel: 8regs : 17293 MB/sec Feb 9 18:34:52.111012 kernel: 32regs : 20755 MB/sec Feb 9 18:34:52.121764 kernel: arm64_neon : 27920 MB/sec Feb 9 18:34:52.121775 kernel: xor: using function: arm64_neon (27920 MB/sec) Feb 9 18:34:52.179152 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:34:52.188218 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:34:52.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:52.198000 audit: BPF prog-id=7 op=LOAD Feb 9 18:34:52.198000 audit: BPF prog-id=8 op=LOAD Feb 9 18:34:52.198751 systemd[1]: Starting systemd-udevd.service... Feb 9 18:34:52.217500 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 9 18:34:52.224440 systemd[1]: Started systemd-udevd.service. Feb 9 18:34:52.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:52.235967 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:34:52.251515 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Feb 9 18:34:52.281766 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:34:52.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:52.288233 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:34:52.323199 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:34:52.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:52.377201 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 18:34:52.399164 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 18:34:52.399212 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 18:34:52.399222 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 18:34:52.399231 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 18:34:52.424659 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 18:34:52.424718 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 18:34:52.436115 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 18:34:52.436298 kernel: scsi host0: storvsc_host_t Feb 9 18:34:52.443859 kernel: scsi host1: storvsc_host_t Feb 9 18:34:52.453327 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 18:34:52.461212 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 18:34:52.481680 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 18:34:52.481877 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:34:52.481889 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 18:34:52.493331 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 18:34:52.493485 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 18:34:52.505381 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 18:34:52.505574 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 18:34:52.507159 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 18:34:52.507297 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:34:52.524236 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 18:34:52.524421 kernel: hv_netvsc 00224878-4d78-0022-4878-4d7800224878 eth0: VF slot 1 added Feb 9 18:34:52.537213 kernel: hv_vmbus: registering driver hv_pci Feb 9 18:34:52.547161 kernel: hv_pci b7a5bf29-7bab-44e1-a1e5-12d56137b236: PCI VMBus probing: Using version 0x10004 Feb 9 18:34:52.570811 kernel: hv_pci b7a5bf29-7bab-44e1-a1e5-12d56137b236: PCI host bridge to bus 7bab:00 Feb 9 18:34:52.570988 kernel: pci_bus 7bab:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 18:34:52.579872 kernel: pci_bus 7bab:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 18:34:52.587206 kernel: pci 7bab:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 18:34:52.602026 kernel: pci 7bab:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:34:52.623273 kernel: pci 7bab:00:02.0: enabling Extended Tags Feb 9 18:34:52.650876 kernel: pci 7bab:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 7bab:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 18:34:52.651033 kernel: pci_bus 7bab:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 18:34:52.651123 kernel: pci 7bab:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:34:52.700161 kernel: mlx5_core 7bab:00:02.0: firmware version: 16.30.1284 Feb 9 18:34:52.856152 kernel: mlx5_core 7bab:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 18:34:52.917562 kernel: hv_netvsc 00224878-4d78-0022-4878-4d7800224878 eth0: VF registering: eth1 Feb 9 18:34:52.917738 kernel: mlx5_core 7bab:00:02.0 eth1: joined to eth0 Feb 9 18:34:52.934162 kernel: mlx5_core 7bab:00:02.0 enP31659s1: renamed from eth1 Feb 9 18:34:52.940722 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:34:53.015162 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (528) Feb 9 18:34:53.027122 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:34:53.157336 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:34:53.164540 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:34:53.176280 systemd[1]: Starting disk-uuid.service... Feb 9 18:34:53.232821 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:34:54.205086 disk-uuid[597]: The operation has completed successfully. Feb 9 18:34:54.210978 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:34:54.253598 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:34:54.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.253687 systemd[1]: Finished disk-uuid.service. Feb 9 18:34:54.271094 systemd[1]: Starting verity-setup.service... Feb 9 18:34:54.316163 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:34:54.523455 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:34:54.534653 systemd[1]: Finished verity-setup.service. Feb 9 18:34:54.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.540761 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:34:54.601159 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:34:54.601974 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:34:54.606823 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:34:54.607610 systemd[1]: Starting ignition-setup.service... Feb 9 18:34:54.615881 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:34:54.657663 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:34:54.657722 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:34:54.663331 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:34:54.723175 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:34:54.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.733000 audit: BPF prog-id=9 op=LOAD Feb 9 18:34:54.734264 systemd[1]: Starting systemd-networkd.service... Feb 9 18:34:54.757481 systemd-networkd[848]: lo: Link UP Feb 9 18:34:54.757488 systemd-networkd[848]: lo: Gained carrier Feb 9 18:34:54.757861 systemd-networkd[848]: Enumeration completed Feb 9 18:34:54.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.762644 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:34:54.762930 systemd[1]: Started systemd-networkd.service. Feb 9 18:34:54.768642 systemd-networkd[848]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:34:54.773715 systemd[1]: Reached target network.target. Feb 9 18:34:54.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.783236 systemd[1]: Starting iscsiuio.service... Feb 9 18:34:54.793705 systemd[1]: Started iscsiuio.service. Feb 9 18:34:54.812351 systemd[1]: Starting iscsid.service... Feb 9 18:34:54.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.840554 iscsid[857]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:34:54.840554 iscsid[857]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 18:34:54.840554 iscsid[857]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:34:54.840554 iscsid[857]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:34:54.840554 iscsid[857]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:34:54.840554 iscsid[857]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:34:54.840554 iscsid[857]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:34:54.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.830929 systemd[1]: Started iscsid.service. Feb 9 18:34:54.839829 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:34:54.899443 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:34:54.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:54.904929 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:34:54.981872 kernel: mlx5_core 7bab:00:02.0 enP31659s1: Link up Feb 9 18:34:54.910608 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:34:54.923131 systemd[1]: Reached target remote-fs.target. Feb 9 18:34:54.937122 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:34:54.960475 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:34:55.024153 kernel: hv_netvsc 00224878-4d78-0022-4878-4d7800224878 eth0: Data path switched to VF: enP31659s1 Feb 9 18:34:55.031149 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:34:55.031490 systemd-networkd[848]: enP31659s1: Link UP Feb 9 18:34:55.031711 systemd-networkd[848]: eth0: Link UP Feb 9 18:34:55.032050 systemd-networkd[848]: eth0: Gained carrier Feb 9 18:34:55.045640 systemd-networkd[848]: enP31659s1: Gained carrier Feb 9 18:34:55.058211 systemd-networkd[848]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:34:55.060777 systemd[1]: Finished ignition-setup.service. Feb 9 18:34:55.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:55.104384 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 9 18:34:55.104458 kernel: audit: type=1130 audit(1707503695.074:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:55.104602 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:34:57.081273 systemd-networkd[848]: eth0: Gained IPv6LL Feb 9 18:34:58.076398 ignition[872]: Ignition 2.14.0 Feb 9 18:34:58.076410 ignition[872]: Stage: fetch-offline Feb 9 18:34:58.076477 ignition[872]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:34:58.076501 ignition[872]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:34:58.166976 ignition[872]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:34:58.167176 ignition[872]: parsed url from cmdline: "" Feb 9 18:34:58.167180 ignition[872]: no config URL provided Feb 9 18:34:58.167185 ignition[872]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:34:58.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.175720 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:34:58.222938 kernel: audit: type=1130 audit(1707503698.186:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.167197 ignition[872]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:34:58.187673 systemd[1]: Starting ignition-fetch.service... Feb 9 18:34:58.167203 ignition[872]: failed to fetch config: resource requires networking Feb 9 18:34:58.167574 ignition[872]: Ignition finished successfully Feb 9 18:34:58.205951 ignition[878]: Ignition 2.14.0 Feb 9 18:34:58.205957 ignition[878]: Stage: fetch Feb 9 18:34:58.206064 ignition[878]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:34:58.206087 ignition[878]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:34:58.209013 ignition[878]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:34:58.217595 ignition[878]: parsed url from cmdline: "" Feb 9 18:34:58.217603 ignition[878]: no config URL provided Feb 9 18:34:58.217611 ignition[878]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:34:58.217622 ignition[878]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:34:58.217676 ignition[878]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 18:34:58.315734 ignition[878]: GET result: OK Feb 9 18:34:58.315819 ignition[878]: config has been read from IMDS userdata Feb 9 18:34:58.315851 ignition[878]: parsing config with SHA512: c76f355fb4b10ebb4f558c654929bd12df0640823d379dacf71cd21641b175dffae000ea5cf7d6987738ab740d6d136e0b813a540db5c43fb3b77fa518d40517 Feb 9 18:34:58.333510 unknown[878]: fetched base config from "system" Feb 9 18:34:58.333525 unknown[878]: fetched base config from "system" Feb 9 18:34:58.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.335435 ignition[878]: fetch: fetch complete Feb 9 18:34:58.374505 kernel: audit: type=1130 audit(1707503698.345:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.333533 unknown[878]: fetched user config from "azure" Feb 9 18:34:58.335441 ignition[878]: fetch: fetch passed Feb 9 18:34:58.340130 systemd[1]: Finished ignition-fetch.service. Feb 9 18:34:58.335508 ignition[878]: Ignition finished successfully Feb 9 18:34:58.346527 systemd[1]: Starting ignition-kargs.service... Feb 9 18:34:58.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.383662 ignition[884]: Ignition 2.14.0 Feb 9 18:34:58.441180 kernel: audit: type=1130 audit(1707503698.406:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.395908 systemd[1]: Finished ignition-kargs.service. Feb 9 18:34:58.383669 ignition[884]: Stage: kargs Feb 9 18:34:58.432263 systemd[1]: Starting ignition-disks.service... Feb 9 18:34:58.383766 ignition[884]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:34:58.383783 ignition[884]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:34:58.390767 ignition[884]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:34:58.506336 kernel: audit: type=1130 audit(1707503698.474:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.468203 systemd[1]: Finished ignition-disks.service. Feb 9 18:34:58.391867 ignition[884]: kargs: kargs passed Feb 9 18:34:58.474380 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:34:58.391913 ignition[884]: Ignition finished successfully Feb 9 18:34:58.511204 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:34:58.439122 ignition[890]: Ignition 2.14.0 Feb 9 18:34:58.516379 systemd[1]: Reached target local-fs.target. Feb 9 18:34:58.439128 ignition[890]: Stage: disks Feb 9 18:34:58.525380 systemd[1]: Reached target sysinit.target. Feb 9 18:34:58.439252 ignition[890]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:34:58.535269 systemd[1]: Reached target basic.target. Feb 9 18:34:58.439270 ignition[890]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:34:58.545895 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:34:58.442157 ignition[890]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:34:58.444078 ignition[890]: disks: disks passed Feb 9 18:34:58.444132 ignition[890]: Ignition finished successfully Feb 9 18:34:58.607803 systemd-fsck[898]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 18:34:58.622585 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:34:58.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.653779 systemd[1]: Mounting sysroot.mount... Feb 9 18:34:58.663575 kernel: audit: type=1130 audit(1707503698.627:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:58.677169 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:34:58.677609 systemd[1]: Mounted sysroot.mount. Feb 9 18:34:58.686307 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:34:58.720576 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:34:58.726013 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 18:34:58.734853 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:34:58.734887 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:34:58.741719 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:34:58.800524 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:34:58.807709 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:34:58.834153 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (909) Feb 9 18:34:58.842518 initrd-setup-root[914]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:34:58.856082 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:34:58.856113 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:34:58.856123 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:34:58.865019 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:34:58.877284 initrd-setup-root[940]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:34:58.887579 initrd-setup-root[948]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:34:58.911799 initrd-setup-root[956]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:34:59.373463 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:34:59.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.379809 systemd[1]: Starting ignition-mount.service... Feb 9 18:34:59.414162 kernel: audit: type=1130 audit(1707503699.378:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.415293 systemd[1]: Starting sysroot-boot.service... Feb 9 18:34:59.426357 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:34:59.433962 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:34:59.448436 systemd[1]: Finished sysroot-boot.service. Feb 9 18:34:59.479364 kernel: audit: type=1130 audit(1707503699.453:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.479430 ignition[978]: INFO : Ignition 2.14.0 Feb 9 18:34:59.479430 ignition[978]: INFO : Stage: mount Feb 9 18:34:59.479430 ignition[978]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:34:59.479430 ignition[978]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:34:59.479430 ignition[978]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:34:59.479430 ignition[978]: INFO : mount: mount passed Feb 9 18:34:59.479430 ignition[978]: INFO : Ignition finished successfully Feb 9 18:34:59.557088 kernel: audit: type=1130 audit(1707503699.484:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:34:59.479210 systemd[1]: Finished ignition-mount.service. Feb 9 18:35:00.089596 coreos-metadata[908]: Feb 09 18:35:00.089 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:35:00.099625 coreos-metadata[908]: Feb 09 18:35:00.099 INFO Fetch successful Feb 9 18:35:00.131994 coreos-metadata[908]: Feb 09 18:35:00.131 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:35:00.158297 coreos-metadata[908]: Feb 09 18:35:00.158 INFO Fetch successful Feb 9 18:35:00.165194 coreos-metadata[908]: Feb 09 18:35:00.165 INFO wrote hostname ci-3510.3.2-a-a0f092b2b2 to /sysroot/etc/hostname Feb 9 18:35:00.176427 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 18:35:00.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:00.209374 systemd[1]: Starting ignition-files.service... Feb 9 18:35:00.219335 kernel: audit: type=1130 audit(1707503700.182:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:00.222300 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:35:00.245163 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (988) Feb 9 18:35:00.260553 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:35:00.260571 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:35:00.260581 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:35:00.271358 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:35:00.286288 ignition[1007]: INFO : Ignition 2.14.0 Feb 9 18:35:00.286288 ignition[1007]: INFO : Stage: files Feb 9 18:35:00.286288 ignition[1007]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:35:00.286288 ignition[1007]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:35:00.322748 ignition[1007]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:35:00.322748 ignition[1007]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:35:00.322748 ignition[1007]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:35:00.322748 ignition[1007]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:35:00.386841 ignition[1007]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:35:00.395732 ignition[1007]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:35:00.410113 unknown[1007]: wrote ssh authorized keys file for user: core Feb 9 18:35:00.417742 ignition[1007]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:35:00.417742 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:35:00.417742 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 9 18:35:00.888701 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:35:01.176630 ignition[1007]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 9 18:35:01.195787 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 9 18:35:01.195787 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:35:01.195787 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:35:01.565375 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:35:01.706695 ignition[1007]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 9 18:35:01.725912 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 9 18:35:01.725912 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:35:01.725912 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:35:02.076031 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:35:02.373998 ignition[1007]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 9 18:35:02.393447 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:35:02.393447 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:35:02.393447 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:35:02.453034 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:35:03.064383 ignition[1007]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:35:03.084427 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:35:03.238274 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1007) Feb 9 18:35:03.238302 kernel: audit: type=1130 audit(1707503703.194:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860609046" Feb 9 18:35:03.238353 ignition[1007]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860609046": device or resource busy Feb 9 18:35:03.238353 ignition[1007]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2860609046", trying btrfs: device or resource busy Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860609046" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2860609046" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2860609046" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2860609046" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1585576418" Feb 9 18:35:03.238353 ignition[1007]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1585576418": device or resource busy Feb 9 18:35:03.238353 ignition[1007]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1585576418", trying btrfs: device or resource busy Feb 9 18:35:03.238353 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1585576418" Feb 9 18:35:03.602450 kernel: audit: type=1130 audit(1707503703.331:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.602488 kernel: audit: type=1131 audit(1707503703.331:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.602499 kernel: audit: type=1130 audit(1707503703.390:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.602510 kernel: audit: type=1130 audit(1707503703.463:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.602519 kernel: audit: type=1131 audit(1707503703.463:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.140710 systemd[1]: mnt-oem2860609046.mount: Deactivated successfully. Feb 9 18:35:03.609058 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1585576418" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1585576418" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1585576418" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 18:35:03.609058 ignition[1007]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:35:03.976489 kernel: audit: type=1130 audit(1707503703.627:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.976527 kernel: audit: type=1130 audit(1707503703.680:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.976540 kernel: audit: type=1131 audit(1707503703.699:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.680000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.699000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.178685 systemd[1]: mnt-oem1585576418.mount: Deactivated successfully. Feb 9 18:35:03.991628 ignition[1007]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:35:03.991628 ignition[1007]: INFO : files: files passed Feb 9 18:35:03.991628 ignition[1007]: INFO : Ignition finished successfully Feb 9 18:35:03.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.043000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.118188 initrd-setup-root-after-ignition[1032]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:35:04.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.179113 systemd[1]: Finished ignition-files.service. Feb 9 18:35:04.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.142535 iscsid[857]: iscsid shutting down. Feb 9 18:35:04.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.237725 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:35:04.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.257041 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:35:04.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.257848 systemd[1]: Starting ignition-quench.service... Feb 9 18:35:04.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.278576 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:35:04.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.278681 systemd[1]: Finished ignition-quench.service. Feb 9 18:35:03.336383 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:35:04.219482 ignition[1045]: INFO : Ignition 2.14.0 Feb 9 18:35:04.219482 ignition[1045]: INFO : Stage: umount Feb 9 18:35:04.219482 ignition[1045]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:35:04.219482 ignition[1045]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:35:04.219482 ignition[1045]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:35:04.219482 ignition[1045]: INFO : umount: umount passed Feb 9 18:35:04.219482 ignition[1045]: INFO : Ignition finished successfully Feb 9 18:35:04.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.390687 systemd[1]: Reached target ignition-complete.target. Feb 9 18:35:03.439686 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:35:03.455384 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:35:04.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.455506 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:35:03.463628 systemd[1]: Reached target initrd-fs.target. Feb 9 18:35:03.519615 systemd[1]: Reached target initrd.target. Feb 9 18:35:03.538267 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:35:03.539234 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:35:03.609302 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:35:04.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.628201 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:35:04.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.671895 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:35:04.391000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:35:03.671993 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:35:04.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.699815 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:35:04.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.741248 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:35:04.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.754778 systemd[1]: Stopped target timers.target. Feb 9 18:35:03.767175 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:35:03.767245 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:35:04.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.780375 systemd[1]: Stopped target initrd.target. Feb 9 18:35:03.793156 systemd[1]: Stopped target basic.target. Feb 9 18:35:03.806554 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:35:04.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.825963 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:35:04.514877 kernel: hv_netvsc 00224878-4d78-0022-4878-4d7800224878 eth0: Data path switched from VF: enP31659s1 Feb 9 18:35:04.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.846928 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:35:04.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.861861 systemd[1]: Stopped target remote-fs.target. Feb 9 18:35:03.875441 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:35:03.893902 systemd[1]: Stopped target sysinit.target. Feb 9 18:35:03.911582 systemd[1]: Stopped target local-fs.target. Feb 9 18:35:03.925429 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:35:04.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.940283 systemd[1]: Stopped target swap.target. Feb 9 18:35:04.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.953322 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:35:03.953387 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:35:03.967830 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:35:03.984163 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:35:03.984214 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:35:03.996816 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:35:04.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:03.996856 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:35:04.012639 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:35:04.012676 systemd[1]: Stopped ignition-files.service. Feb 9 18:35:04.027763 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 18:35:04.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.027801 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 18:35:04.044329 systemd[1]: Stopping ignition-mount.service... Feb 9 18:35:04.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:04.057669 systemd[1]: Stopping iscsid.service... Feb 9 18:35:04.061692 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:35:04.061769 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:35:04.068297 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:35:04.102221 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:35:04.102308 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:35:04.112247 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:35:04.112291 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:35:04.739255 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 9 18:35:04.124216 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:35:04.124322 systemd[1]: Stopped iscsid.service. Feb 9 18:35:04.138171 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:35:04.138252 systemd[1]: Stopped ignition-mount.service. Feb 9 18:35:04.147622 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:35:04.147680 systemd[1]: Stopped ignition-disks.service. Feb 9 18:35:04.156784 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:35:04.156831 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:35:04.168327 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:35:04.168366 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:35:04.186240 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:35:04.186281 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:35:04.197087 systemd[1]: Stopped target paths.target. Feb 9 18:35:04.208175 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:35:04.220004 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:35:04.230979 systemd[1]: Stopped target slices.target. Feb 9 18:35:04.241265 systemd[1]: Stopped target sockets.target. Feb 9 18:35:04.270345 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:35:04.270393 systemd[1]: Closed iscsid.socket. Feb 9 18:35:04.282562 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:35:04.282607 systemd[1]: Stopped ignition-setup.service. Feb 9 18:35:04.292473 systemd[1]: Stopping iscsiuio.service... Feb 9 18:35:04.308478 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:35:04.308583 systemd[1]: Stopped iscsiuio.service. Feb 9 18:35:04.317850 systemd[1]: Stopped target network.target. Feb 9 18:35:04.328617 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:35:04.328657 systemd[1]: Closed iscsiuio.socket. Feb 9 18:35:04.338045 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:35:04.347434 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:35:04.363964 systemd-networkd[848]: eth0: DHCPv6 lease lost Feb 9 18:35:04.739000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:35:04.365234 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:35:04.365343 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:35:04.376951 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:35:04.377042 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:35:04.386854 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:35:04.386895 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:35:04.396978 systemd[1]: Stopping network-cleanup.service... Feb 9 18:35:04.407048 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:35:04.407115 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:35:04.412756 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:35:04.412809 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:35:04.426669 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:35:04.426724 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:35:04.432495 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:35:04.444194 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:35:04.446831 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:35:04.446987 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:35:04.457986 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:35:04.458025 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:35:04.468667 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:35:04.468708 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:35:04.478298 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:35:04.478345 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:35:04.489410 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:35:04.489456 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:35:04.509411 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:35:04.509456 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:35:04.525528 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:35:04.541824 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:35:04.541975 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:35:04.558762 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:35:04.558860 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:35:04.601369 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:35:04.605987 systemd[1]: Stopped network-cleanup.service. Feb 9 18:35:04.613502 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:35:04.636744 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:35:04.636865 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:35:04.644086 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:35:04.657296 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:35:04.657360 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:35:04.669296 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:35:04.688971 systemd[1]: Switching root. Feb 9 18:35:04.741094 systemd-journald[276]: Journal stopped Feb 9 18:35:16.043180 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:35:16.043200 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:35:16.043210 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:35:16.043220 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:35:16.043228 kernel: SELinux: policy capability open_perms=1 Feb 9 18:35:16.043236 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:35:16.043245 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:35:16.043253 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:35:16.043261 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:35:16.043269 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:35:16.043278 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:35:16.043286 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:35:16.043294 kernel: audit: type=1403 audit(1707503707.305:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:35:16.043304 systemd[1]: Successfully loaded SELinux policy in 288.602ms. Feb 9 18:35:16.043317 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.869ms. Feb 9 18:35:16.043328 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:35:16.043338 systemd[1]: Detected virtualization microsoft. Feb 9 18:35:16.043347 systemd[1]: Detected architecture arm64. Feb 9 18:35:16.043356 systemd[1]: Detected first boot. Feb 9 18:35:16.043366 systemd[1]: Hostname set to . Feb 9 18:35:16.043374 systemd[1]: Initializing machine ID from random generator. Feb 9 18:35:16.043384 kernel: audit: type=1400 audit(1707503708.031:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:35:16.043394 kernel: audit: type=1400 audit(1707503708.034:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:35:16.043403 kernel: audit: type=1334 audit(1707503708.050:84): prog-id=10 op=LOAD Feb 9 18:35:16.043412 kernel: audit: type=1334 audit(1707503708.050:85): prog-id=10 op=UNLOAD Feb 9 18:35:16.043420 kernel: audit: type=1334 audit(1707503708.070:86): prog-id=11 op=LOAD Feb 9 18:35:16.043429 kernel: audit: type=1334 audit(1707503708.070:87): prog-id=11 op=UNLOAD Feb 9 18:35:16.043438 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:35:16.043447 kernel: audit: type=1400 audit(1707503709.418:88): avc: denied { associate } for pid=1079 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:35:16.043458 kernel: audit: type=1300 audit(1707503709.418:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022814 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1062 pid=1079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:16.043467 kernel: audit: type=1327 audit(1707503709.418:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:35:16.043476 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:35:16.043486 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:35:16.043495 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:35:16.043505 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:35:16.043516 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 9 18:35:16.043524 kernel: audit: type=1334 audit(1707503715.287:90): prog-id=12 op=LOAD Feb 9 18:35:16.043533 kernel: audit: type=1334 audit(1707503715.287:91): prog-id=3 op=UNLOAD Feb 9 18:35:16.043541 kernel: audit: type=1334 audit(1707503715.287:92): prog-id=13 op=LOAD Feb 9 18:35:16.043550 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:35:16.043561 kernel: audit: type=1334 audit(1707503715.287:93): prog-id=14 op=LOAD Feb 9 18:35:16.043571 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:35:16.043580 kernel: audit: type=1334 audit(1707503715.287:94): prog-id=4 op=UNLOAD Feb 9 18:35:16.043590 kernel: audit: type=1334 audit(1707503715.287:95): prog-id=5 op=UNLOAD Feb 9 18:35:16.043598 kernel: audit: type=1334 audit(1707503715.294:96): prog-id=15 op=LOAD Feb 9 18:35:16.043607 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:35:16.043616 kernel: audit: type=1334 audit(1707503715.294:97): prog-id=12 op=UNLOAD Feb 9 18:35:16.043625 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:35:16.043635 kernel: audit: type=1334 audit(1707503715.301:98): prog-id=16 op=LOAD Feb 9 18:35:16.043643 kernel: audit: type=1334 audit(1707503715.308:99): prog-id=17 op=LOAD Feb 9 18:35:16.043652 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:35:16.043663 systemd[1]: Created slice system-getty.slice. Feb 9 18:35:16.043672 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:35:16.043681 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:35:16.043691 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:35:16.043700 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:35:16.043710 systemd[1]: Created slice user.slice. Feb 9 18:35:16.043719 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:35:16.043729 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:35:16.043738 systemd[1]: Set up automount boot.automount. Feb 9 18:35:16.043748 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:35:16.043758 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:35:16.043767 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:35:16.043776 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:35:16.043785 systemd[1]: Reached target integritysetup.target. Feb 9 18:35:16.043795 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:35:16.043804 systemd[1]: Reached target remote-fs.target. Feb 9 18:35:16.043814 systemd[1]: Reached target slices.target. Feb 9 18:35:16.043824 systemd[1]: Reached target swap.target. Feb 9 18:35:16.043833 systemd[1]: Reached target torcx.target. Feb 9 18:35:16.043842 systemd[1]: Reached target veritysetup.target. Feb 9 18:35:16.043852 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:35:16.043861 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:35:16.043870 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:35:16.043881 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:35:16.043891 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:35:16.043900 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:35:16.043910 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:35:16.043920 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:35:16.043929 systemd[1]: Mounting media.mount... Feb 9 18:35:16.043939 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:35:16.043949 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:35:16.043959 systemd[1]: Mounting tmp.mount... Feb 9 18:35:16.043968 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:35:16.043978 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:35:16.043987 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:35:16.043996 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:35:16.044006 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:35:16.044015 systemd[1]: Starting modprobe@drm.service... Feb 9 18:35:16.044025 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:35:16.044035 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:35:16.044044 systemd[1]: Starting modprobe@loop.service... Feb 9 18:35:16.044054 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:35:16.044064 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:35:16.044073 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:35:16.044083 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:35:16.044092 kernel: fuse: init (API version 7.34) Feb 9 18:35:16.044100 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:35:16.044110 kernel: loop: module loaded Feb 9 18:35:16.044121 systemd[1]: Stopped systemd-journald.service. Feb 9 18:35:16.044131 systemd[1]: systemd-journald.service: Consumed 3.471s CPU time. Feb 9 18:35:16.044148 systemd[1]: Starting systemd-journald.service... Feb 9 18:35:16.044158 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:35:16.044167 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:35:16.044177 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:35:16.044189 systemd-journald[1185]: Journal started Feb 9 18:35:16.044227 systemd-journald[1185]: Runtime Journal (/run/log/journal/b865569dfdf249ae8d815cd9626e6f62) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:35:07.305000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:35:08.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:35:08.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:35:08.050000 audit: BPF prog-id=10 op=LOAD Feb 9 18:35:08.050000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:35:08.070000 audit: BPF prog-id=11 op=LOAD Feb 9 18:35:08.070000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:35:09.418000 audit[1079]: AVC avc: denied { associate } for pid=1079 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:35:09.418000 audit[1079]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022814 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1062 pid=1079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:09.418000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:35:09.429000 audit[1079]: AVC avc: denied { associate } for pid=1079 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:35:09.429000 audit[1079]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228f9 a2=1ed a3=0 items=2 ppid=1062 pid=1079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:09.429000 audit: CWD cwd="/" Feb 9 18:35:09.429000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:09.429000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:09.429000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:35:15.287000 audit: BPF prog-id=12 op=LOAD Feb 9 18:35:15.287000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:35:15.287000 audit: BPF prog-id=13 op=LOAD Feb 9 18:35:15.287000 audit: BPF prog-id=14 op=LOAD Feb 9 18:35:15.287000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:35:15.287000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:35:15.294000 audit: BPF prog-id=15 op=LOAD Feb 9 18:35:15.294000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:35:15.301000 audit: BPF prog-id=16 op=LOAD Feb 9 18:35:15.308000 audit: BPF prog-id=17 op=LOAD Feb 9 18:35:15.308000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:35:15.308000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:35:15.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.336000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:35:15.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:15.962000 audit: BPF prog-id=18 op=LOAD Feb 9 18:35:15.962000 audit: BPF prog-id=19 op=LOAD Feb 9 18:35:15.962000 audit: BPF prog-id=20 op=LOAD Feb 9 18:35:15.962000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:35:15.962000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:35:16.037000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:35:16.037000 audit[1185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc78420b0 a2=4000 a3=1 items=0 ppid=1 pid=1185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:16.037000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:35:09.352100 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:35:15.286166 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:35:09.383819 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:35:15.309480 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:35:09.383856 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:35:15.309831 systemd[1]: systemd-journald.service: Consumed 3.471s CPU time. Feb 9 18:35:09.383912 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:35:09.383923 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:35:09.383962 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:35:09.383975 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:35:09.384194 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:35:09.384228 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:35:09.384240 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:35:09.400263 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:35:09.400320 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:35:09.400358 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:35:09.400384 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:35:09.400415 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:35:09.400428 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:35:14.401957 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:35:14.402230 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:35:14.402334 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:35:14.402487 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:35:14.402534 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:35:14.402588 /usr/lib/systemd/system-generators/torcx-generator[1079]: time="2024-02-09T18:35:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:35:16.060658 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:35:16.073676 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:35:16.073730 systemd[1]: Stopped verity-setup.service. Feb 9 18:35:16.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.091518 systemd[1]: Started systemd-journald.service. Feb 9 18:35:16.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.096409 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:35:16.101919 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:35:16.106890 systemd[1]: Mounted media.mount. Feb 9 18:35:16.111554 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:35:16.116663 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:35:16.122088 systemd[1]: Mounted tmp.mount. Feb 9 18:35:16.126572 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:35:16.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.132217 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:35:16.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.140867 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:35:16.141039 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:35:16.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.146654 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:35:16.146764 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:35:16.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.152151 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:35:16.152268 systemd[1]: Finished modprobe@drm.service. Feb 9 18:35:16.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.157670 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:35:16.157829 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:35:16.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.163587 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:35:16.163706 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:35:16.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.169018 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:35:16.169148 systemd[1]: Finished modprobe@loop.service. Feb 9 18:35:16.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.174379 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:35:16.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.180126 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:35:16.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.186215 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:35:16.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.191778 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:35:16.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.197764 systemd[1]: Reached target network-pre.target. Feb 9 18:35:16.204302 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:35:16.210539 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:35:16.215160 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:35:16.216504 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:35:16.222406 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:35:16.227332 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:35:16.228312 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:35:16.233620 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:35:16.234619 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:35:16.240328 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:35:16.245882 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:35:16.253037 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:35:16.258804 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:35:16.265698 udevadm[1199]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 9 18:35:16.282563 systemd-journald[1185]: Time spent on flushing to /var/log/journal/b865569dfdf249ae8d815cd9626e6f62 is 14.543ms for 1109 entries. Feb 9 18:35:16.282563 systemd-journald[1185]: System Journal (/var/log/journal/b865569dfdf249ae8d815cd9626e6f62) is 8.0M, max 2.6G, 2.6G free. Feb 9 18:35:16.356762 systemd-journald[1185]: Received client request to flush runtime journal. Feb 9 18:35:16.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.293968 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:35:16.303052 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:35:16.309781 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:35:16.357697 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:35:16.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:16.931560 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:35:16.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:17.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:17.350215 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:35:17.356000 audit: BPF prog-id=21 op=LOAD Feb 9 18:35:17.356000 audit: BPF prog-id=22 op=LOAD Feb 9 18:35:17.356000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:35:17.356000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:35:17.357340 systemd[1]: Starting systemd-udevd.service... Feb 9 18:35:17.375917 systemd-udevd[1202]: Using default interface naming scheme 'v252'. Feb 9 18:35:17.521104 systemd[1]: Started systemd-udevd.service. Feb 9 18:35:17.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:17.526000 audit: BPF prog-id=23 op=LOAD Feb 9 18:35:17.528981 systemd[1]: Starting systemd-networkd.service... Feb 9 18:35:17.557922 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:35:17.620103 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:35:17.619000 audit: BPF prog-id=24 op=LOAD Feb 9 18:35:17.619000 audit: BPF prog-id=25 op=LOAD Feb 9 18:35:17.619000 audit: BPF prog-id=26 op=LOAD Feb 9 18:35:17.626000 audit[1210]: AVC avc: denied { confidentiality } for pid=1210 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:35:17.638181 kernel: hv_vmbus: registering driver hv_balloon Feb 9 18:35:17.638246 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 18:35:17.650201 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 18:35:17.626000 audit[1210]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab180c6d70 a1=aa2c a2=ffff85f124b0 a3=aaab18025010 items=12 ppid=1202 pid=1210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:17.626000 audit: CWD cwd="/" Feb 9 18:35:17.626000 audit: PATH item=0 name=(null) inode=6890 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=1 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=2 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=3 name=(null) inode=9797 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=4 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=5 name=(null) inode=9798 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=6 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=7 name=(null) inode=9799 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=8 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=9 name=(null) inode=9800 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=10 name=(null) inode=9796 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PATH item=11 name=(null) inode=9801 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:35:17.626000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:35:17.676384 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 18:35:17.676523 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 18:35:17.676545 kernel: hv_vmbus: registering driver hv_utils Feb 9 18:35:17.676560 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:35:17.685111 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 18:35:17.685229 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 18:35:17.690975 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 18:35:17.691053 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 18:35:17.790065 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 18:35:17.797212 kernel: Console: switching to colour dummy device 80x25 Feb 9 18:35:17.803196 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:35:17.836197 systemd[1]: Started systemd-userdbd.service. Feb 9 18:35:17.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.045186 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1218) Feb 9 18:35:18.069247 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:35:18.075823 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:35:18.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.082851 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:35:18.104275 systemd-networkd[1223]: lo: Link UP Feb 9 18:35:18.104515 systemd-networkd[1223]: lo: Gained carrier Feb 9 18:35:18.104978 systemd-networkd[1223]: Enumeration completed Feb 9 18:35:18.105169 systemd[1]: Started systemd-networkd.service. Feb 9 18:35:18.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.111852 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:35:18.132491 systemd-networkd[1223]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:35:18.181234 kernel: mlx5_core 7bab:00:02.0 enP31659s1: Link up Feb 9 18:35:18.208235 kernel: hv_netvsc 00224878-4d78-0022-4878-4d7800224878 eth0: Data path switched to VF: enP31659s1 Feb 9 18:35:18.208805 systemd-networkd[1223]: enP31659s1: Link UP Feb 9 18:35:18.208896 systemd-networkd[1223]: eth0: Link UP Feb 9 18:35:18.208904 systemd-networkd[1223]: eth0: Gained carrier Feb 9 18:35:18.213417 systemd-networkd[1223]: enP31659s1: Gained carrier Feb 9 18:35:18.223296 systemd-networkd[1223]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:35:18.343135 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:35:18.387145 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:35:18.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.393246 systemd[1]: Reached target cryptsetup.target. Feb 9 18:35:18.399919 systemd[1]: Starting lvm2-activation.service... Feb 9 18:35:18.404046 lvm[1282]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:35:18.422018 systemd[1]: Finished lvm2-activation.service. Feb 9 18:35:18.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.427649 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:35:18.433416 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:35:18.433441 systemd[1]: Reached target local-fs.target. Feb 9 18:35:18.438885 systemd[1]: Reached target machines.target. Feb 9 18:35:18.445236 systemd[1]: Starting ldconfig.service... Feb 9 18:35:18.464489 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:35:18.464556 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:35:18.465694 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:35:18.471707 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:35:18.479014 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:35:18.484659 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:35:18.484717 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:35:18.485825 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:35:18.824545 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1284 (bootctl) Feb 9 18:35:18.825882 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:35:18.833924 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:35:18.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.881624 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:35:18.882224 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:35:18.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.922087 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:35:18.977187 systemd-fsck[1292]: fsck.fat 4.2 (2021-01-31) Feb 9 18:35:18.977187 systemd-fsck[1292]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 18:35:18.980556 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:35:18.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:18.991069 systemd[1]: Mounting boot.mount... Feb 9 18:35:19.000237 systemd[1]: Mounted boot.mount. Feb 9 18:35:19.011000 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:35:19.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.057003 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:35:19.117809 systemd-tmpfiles[1287]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:35:19.374347 systemd-networkd[1223]: eth0: Gained IPv6LL Feb 9 18:35:19.377071 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:35:19.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.689416 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:35:19.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.697039 systemd[1]: Starting audit-rules.service... Feb 9 18:35:19.702852 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:35:19.709244 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:35:19.718000 audit: BPF prog-id=27 op=LOAD Feb 9 18:35:19.720146 systemd[1]: Starting systemd-resolved.service... Feb 9 18:35:19.725000 audit: BPF prog-id=28 op=LOAD Feb 9 18:35:19.727343 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:35:19.733438 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:35:19.786935 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:35:19.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.793869 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:35:19.795000 audit[1304]: SYSTEM_BOOT pid=1304 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.799111 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:35:19.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.823863 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:35:19.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.829543 systemd[1]: Reached target time-set.target. Feb 9 18:35:19.866018 systemd-resolved[1302]: Positive Trust Anchors: Feb 9 18:35:19.866370 systemd-resolved[1302]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:35:19.866453 systemd-resolved[1302]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:35:19.900218 systemd-resolved[1302]: Using system hostname 'ci-3510.3.2-a-a0f092b2b2'. Feb 9 18:35:19.901772 systemd[1]: Started systemd-resolved.service. Feb 9 18:35:19.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:19.907408 systemd[1]: Reached target network.target. Feb 9 18:35:19.912548 systemd[1]: Reached target network-online.target. Feb 9 18:35:19.918397 systemd[1]: Reached target nss-lookup.target. Feb 9 18:35:20.030444 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:35:20.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:35:20.130000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:35:20.130000 audit[1319]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff035bca0 a2=420 a3=0 items=0 ppid=1298 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:35:20.130000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:35:20.131812 augenrules[1319]: No rules Feb 9 18:35:20.132711 systemd[1]: Finished audit-rules.service. Feb 9 18:35:20.197639 systemd-timesyncd[1303]: Contacted time server 165.140.142.118:123 (0.flatcar.pool.ntp.org). Feb 9 18:35:20.198018 systemd-timesyncd[1303]: Initial clock synchronization to Fri 2024-02-09 18:35:20.191605 UTC. Feb 9 18:35:26.121675 ldconfig[1283]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:35:26.137506 systemd[1]: Finished ldconfig.service. Feb 9 18:35:26.145223 systemd[1]: Starting systemd-update-done.service... Feb 9 18:35:26.181899 systemd[1]: Finished systemd-update-done.service. Feb 9 18:35:26.187570 systemd[1]: Reached target sysinit.target. Feb 9 18:35:26.192966 systemd[1]: Started motdgen.path. Feb 9 18:35:26.197349 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:35:26.204627 systemd[1]: Started logrotate.timer. Feb 9 18:35:26.209392 systemd[1]: Started mdadm.timer. Feb 9 18:35:26.213550 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:35:26.219009 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:35:26.219044 systemd[1]: Reached target paths.target. Feb 9 18:35:26.224123 systemd[1]: Reached target timers.target. Feb 9 18:35:26.229658 systemd[1]: Listening on dbus.socket. Feb 9 18:35:26.235198 systemd[1]: Starting docker.socket... Feb 9 18:35:26.256876 systemd[1]: Listening on sshd.socket. Feb 9 18:35:26.261688 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:35:26.262140 systemd[1]: Listening on docker.socket. Feb 9 18:35:26.266757 systemd[1]: Reached target sockets.target. Feb 9 18:35:26.271951 systemd[1]: Reached target basic.target. Feb 9 18:35:26.276757 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:35:26.276786 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:35:26.277870 systemd[1]: Starting containerd.service... Feb 9 18:35:26.283049 systemd[1]: Starting dbus.service... Feb 9 18:35:26.287894 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:35:26.294123 systemd[1]: Starting extend-filesystems.service... Feb 9 18:35:26.301525 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:35:26.302549 systemd[1]: Starting motdgen.service... Feb 9 18:35:26.307462 systemd[1]: Started nvidia.service. Feb 9 18:35:26.313331 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:35:26.320419 systemd[1]: Starting prepare-critools.service... Feb 9 18:35:26.327758 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:35:26.334432 systemd[1]: Starting sshd-keygen.service... Feb 9 18:35:26.341290 systemd[1]: Starting systemd-logind.service... Feb 9 18:35:26.347810 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:35:26.347878 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:35:26.348365 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:35:26.349060 systemd[1]: Starting update-engine.service... Feb 9 18:35:26.355497 jq[1329]: false Feb 9 18:35:26.356868 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:35:26.364700 jq[1348]: true Feb 9 18:35:26.369553 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:35:26.369757 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:35:26.389041 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:35:26.389238 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:35:26.418252 extend-filesystems[1330]: Found sda Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda1 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda2 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda3 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found usr Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda4 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda6 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda7 Feb 9 18:35:26.424879 extend-filesystems[1330]: Found sda9 Feb 9 18:35:26.424879 extend-filesystems[1330]: Checking size of /dev/sda9 Feb 9 18:35:26.545853 tar[1350]: ./ Feb 9 18:35:26.545853 tar[1350]: ./loopback Feb 9 18:35:26.546220 jq[1355]: true Feb 9 18:35:26.546325 tar[1351]: crictl Feb 9 18:35:26.442757 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:35:26.546635 extend-filesystems[1330]: Old size kept for /dev/sda9 Feb 9 18:35:26.546635 extend-filesystems[1330]: Found sr0 Feb 9 18:35:26.442943 systemd[1]: Finished motdgen.service. Feb 9 18:35:26.623852 dbus-daemon[1328]: [system] SELinux support is enabled Feb 9 18:35:26.641004 tar[1350]: ./bandwidth Feb 9 18:35:26.641116 env[1358]: time="2024-02-09T18:35:26.634773729Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:35:26.457628 systemd-logind[1343]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:35:26.638266 dbus-daemon[1328]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 18:35:26.641518 bash[1378]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:35:26.457955 systemd-logind[1343]: New seat seat0. Feb 9 18:35:26.533040 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:35:26.533254 systemd[1]: Finished extend-filesystems.service. Feb 9 18:35:26.619583 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:35:26.624044 systemd[1]: Started dbus.service. Feb 9 18:35:26.632517 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:35:26.632585 systemd[1]: Reached target system-config.target. Feb 9 18:35:26.640579 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:35:26.640597 systemd[1]: Reached target user-config.target. Feb 9 18:35:26.649725 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:35:26.660178 systemd[1]: Started systemd-logind.service. Feb 9 18:35:26.699058 env[1358]: time="2024-02-09T18:35:26.699000559Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:35:26.699206 env[1358]: time="2024-02-09T18:35:26.699181431Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.711736 env[1358]: time="2024-02-09T18:35:26.711668125Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:35:26.711736 env[1358]: time="2024-02-09T18:35:26.711716432Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712029 env[1358]: time="2024-02-09T18:35:26.711990958Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712029 env[1358]: time="2024-02-09T18:35:26.712021910Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712113 env[1358]: time="2024-02-09T18:35:26.712036186Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:35:26.712113 env[1358]: time="2024-02-09T18:35:26.712045904Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712151 env[1358]: time="2024-02-09T18:35:26.712123483Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712403 env[1358]: time="2024-02-09T18:35:26.712372176Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712548 env[1358]: time="2024-02-09T18:35:26.712517817Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:35:26.712548 env[1358]: time="2024-02-09T18:35:26.712543090Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:35:26.712614 env[1358]: time="2024-02-09T18:35:26.712600875Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:35:26.712646 env[1358]: time="2024-02-09T18:35:26.712613791Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:35:26.735747 tar[1350]: ./ptp Feb 9 18:35:26.746225 env[1358]: time="2024-02-09T18:35:26.746179837Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:35:26.746225 env[1358]: time="2024-02-09T18:35:26.746227944Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:35:26.746377 env[1358]: time="2024-02-09T18:35:26.746241941Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:35:26.746377 env[1358]: time="2024-02-09T18:35:26.746279371Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746377 env[1358]: time="2024-02-09T18:35:26.746294407Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746377 env[1358]: time="2024-02-09T18:35:26.746308483Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746377 env[1358]: time="2024-02-09T18:35:26.746323999Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746732 env[1358]: time="2024-02-09T18:35:26.746707256Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746732 env[1358]: time="2024-02-09T18:35:26.746733009Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746805 env[1358]: time="2024-02-09T18:35:26.746746925Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746805 env[1358]: time="2024-02-09T18:35:26.746761121Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.746805 env[1358]: time="2024-02-09T18:35:26.746774478Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:35:26.746946 env[1358]: time="2024-02-09T18:35:26.746918959Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:35:26.747028 env[1358]: time="2024-02-09T18:35:26.747006216Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747308255Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747355082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747369638Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747430942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747446458Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747461054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747472731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747484688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747497764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747509601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747521318Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747535274Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747673837Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747690273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748207 env[1358]: time="2024-02-09T18:35:26.747704069Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748604 env[1358]: time="2024-02-09T18:35:26.747716545Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:35:26.748604 env[1358]: time="2024-02-09T18:35:26.747730862Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:35:26.748604 env[1358]: time="2024-02-09T18:35:26.747743898Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:35:26.748604 env[1358]: time="2024-02-09T18:35:26.747761094Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:35:26.748604 env[1358]: time="2024-02-09T18:35:26.747800163Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:35:26.748705 env[1358]: time="2024-02-09T18:35:26.747994631Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:35:26.748705 env[1358]: time="2024-02-09T18:35:26.748045097Z" level=info msg="Connect containerd service" Feb 9 18:35:26.748705 env[1358]: time="2024-02-09T18:35:26.748076129Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.749436884Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.749686258Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.749724287Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.749774154Z" level=info msg="containerd successfully booted in 0.144908s" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758394964Z" level=info msg="Start subscribing containerd event" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758461546Z" level=info msg="Start recovering state" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758533047Z" level=info msg="Start event monitor" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758553122Z" level=info msg="Start snapshots syncer" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758563199Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:35:26.763640 env[1358]: time="2024-02-09T18:35:26.758570157Z" level=info msg="Start streaming server" Feb 9 18:35:26.749851 systemd[1]: Started containerd.service. Feb 9 18:35:26.813913 tar[1350]: ./vlan Feb 9 18:35:26.873926 tar[1350]: ./host-device Feb 9 18:35:26.933309 tar[1350]: ./tuning Feb 9 18:35:26.968739 tar[1350]: ./vrf Feb 9 18:35:27.007419 tar[1350]: ./sbr Feb 9 18:35:27.045395 update_engine[1346]: I0209 18:35:27.028347 1346 main.cc:92] Flatcar Update Engine starting Feb 9 18:35:27.059970 tar[1350]: ./tap Feb 9 18:35:27.111504 systemd[1]: Started update-engine.service. Feb 9 18:35:27.111838 update_engine[1346]: I0209 18:35:27.111558 1346 update_check_scheduler.cc:74] Next update check in 9m11s Feb 9 18:35:27.121709 systemd[1]: Started locksmithd.service. Feb 9 18:35:27.134260 tar[1350]: ./dhcp Feb 9 18:35:27.249838 tar[1350]: ./static Feb 9 18:35:27.281347 tar[1350]: ./firewall Feb 9 18:35:27.319999 systemd[1]: Finished prepare-critools.service. Feb 9 18:35:27.348006 tar[1350]: ./macvlan Feb 9 18:35:27.381738 tar[1350]: ./dummy Feb 9 18:35:27.415006 tar[1350]: ./bridge Feb 9 18:35:27.451126 tar[1350]: ./ipvlan Feb 9 18:35:27.484058 tar[1350]: ./portmap Feb 9 18:35:27.515714 tar[1350]: ./host-local Feb 9 18:35:27.612628 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:35:28.604096 sshd_keygen[1347]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:35:28.620837 systemd[1]: Finished sshd-keygen.service. Feb 9 18:35:28.627764 systemd[1]: Starting issuegen.service... Feb 9 18:35:28.633456 systemd[1]: Started waagent.service. Feb 9 18:35:28.638540 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:35:28.638695 systemd[1]: Finished issuegen.service. Feb 9 18:35:28.645114 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:35:28.688360 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:35:28.695418 systemd[1]: Started getty@tty1.service. Feb 9 18:35:28.701611 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:35:28.707665 systemd[1]: Reached target getty.target. Feb 9 18:35:28.712709 systemd[1]: Reached target multi-user.target. Feb 9 18:35:28.721935 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:35:28.734645 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:35:28.734807 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:35:28.741193 systemd[1]: Startup finished in 772ms (kernel) + 16.117s (initrd) + 21.883s (userspace) = 38.774s. Feb 9 18:35:28.857907 locksmithd[1434]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:35:29.435623 login[1456]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 18:35:29.435970 login[1455]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:35:29.459398 systemd[1]: Created slice user-500.slice. Feb 9 18:35:29.460450 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:35:29.463831 systemd-logind[1343]: New session 1 of user core. Feb 9 18:35:29.504587 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:35:29.506442 systemd[1]: Starting user@500.service... Feb 9 18:35:29.524426 (systemd)[1459]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:35:29.752814 systemd[1459]: Queued start job for default target default.target. Feb 9 18:35:29.753347 systemd[1459]: Reached target paths.target. Feb 9 18:35:29.753367 systemd[1459]: Reached target sockets.target. Feb 9 18:35:29.753378 systemd[1459]: Reached target timers.target. Feb 9 18:35:29.753388 systemd[1459]: Reached target basic.target. Feb 9 18:35:29.753489 systemd[1]: Started user@500.service. Feb 9 18:35:29.754364 systemd[1]: Started session-1.scope. Feb 9 18:35:29.754803 systemd[1459]: Reached target default.target. Feb 9 18:35:29.754952 systemd[1459]: Startup finished in 224ms. Feb 9 18:35:30.437099 login[1456]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:35:30.440789 systemd-logind[1343]: New session 2 of user core. Feb 9 18:35:30.441227 systemd[1]: Started session-2.scope. Feb 9 18:35:34.937230 waagent[1453]: 2024-02-09T18:35:34.937103Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 18:35:34.944931 waagent[1453]: 2024-02-09T18:35:34.944848Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 18:35:34.950252 waagent[1453]: 2024-02-09T18:35:34.950185Z INFO Daemon Daemon Python: 3.9.16 Feb 9 18:35:34.955594 waagent[1453]: 2024-02-09T18:35:34.955526Z INFO Daemon Daemon Run daemon Feb 9 18:35:34.961043 waagent[1453]: 2024-02-09T18:35:34.960970Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 18:35:34.979282 waagent[1453]: 2024-02-09T18:35:34.979116Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:35:35.027075 waagent[1453]: 2024-02-09T18:35:35.026924Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:35:35.040123 waagent[1453]: 2024-02-09T18:35:35.040001Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:35:35.046867 waagent[1453]: 2024-02-09T18:35:35.046773Z INFO Daemon Daemon Using waagent for provisioning Feb 9 18:35:35.054239 waagent[1453]: 2024-02-09T18:35:35.054104Z INFO Daemon Daemon Activate resource disk Feb 9 18:35:35.060475 waagent[1453]: 2024-02-09T18:35:35.060372Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 18:35:35.077521 waagent[1453]: 2024-02-09T18:35:35.077434Z INFO Daemon Daemon Found device: None Feb 9 18:35:35.083328 waagent[1453]: 2024-02-09T18:35:35.083251Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 18:35:35.093761 waagent[1453]: 2024-02-09T18:35:35.093642Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 18:35:35.108632 waagent[1453]: 2024-02-09T18:35:35.108567Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:35:35.115887 waagent[1453]: 2024-02-09T18:35:35.115820Z INFO Daemon Daemon Running default provisioning handler Feb 9 18:35:35.130341 waagent[1453]: 2024-02-09T18:35:35.130219Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:35:35.148710 waagent[1453]: 2024-02-09T18:35:35.148586Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:35:35.160417 waagent[1453]: 2024-02-09T18:35:35.160346Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:35:35.166746 waagent[1453]: 2024-02-09T18:35:35.166680Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 18:35:35.265716 waagent[1453]: 2024-02-09T18:35:35.264884Z INFO Daemon Daemon Successfully mounted dvd Feb 9 18:35:35.357100 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 18:35:35.377790 waagent[1453]: 2024-02-09T18:35:35.377653Z INFO Daemon Daemon Detect protocol endpoint Feb 9 18:35:35.383853 waagent[1453]: 2024-02-09T18:35:35.383777Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:35:35.390895 waagent[1453]: 2024-02-09T18:35:35.390827Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 18:35:35.398684 waagent[1453]: 2024-02-09T18:35:35.398622Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 18:35:35.405076 waagent[1453]: 2024-02-09T18:35:35.405017Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 18:35:35.411190 waagent[1453]: 2024-02-09T18:35:35.411117Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 18:35:35.551336 waagent[1453]: 2024-02-09T18:35:35.551210Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 18:35:35.560055 waagent[1453]: 2024-02-09T18:35:35.560007Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 18:35:35.566497 waagent[1453]: 2024-02-09T18:35:35.566436Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 18:35:36.142668 waagent[1453]: 2024-02-09T18:35:36.142500Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 18:35:36.160566 waagent[1453]: 2024-02-09T18:35:36.160490Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 18:35:36.167483 waagent[1453]: 2024-02-09T18:35:36.167417Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 18:35:36.244885 waagent[1453]: 2024-02-09T18:35:36.244744Z INFO Daemon Daemon Found private key matching thumbprint B1B4C04372CB8FE30A7CA4044898D88DD0CD4BE8 Feb 9 18:35:36.255711 waagent[1453]: 2024-02-09T18:35:36.255638Z INFO Daemon Daemon Certificate with thumbprint A94911B38AA2D10D7B8211391C28BDBA6BCB4CAF has no matching private key. Feb 9 18:35:36.267874 waagent[1453]: 2024-02-09T18:35:36.267803Z INFO Daemon Daemon Fetch goal state completed Feb 9 18:35:36.309632 waagent[1453]: 2024-02-09T18:35:36.309571Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 7a76842d-a0f1-43ba-9fff-575f4e8eded2 New eTag: 7975300967808203579] Feb 9 18:35:36.323335 waagent[1453]: 2024-02-09T18:35:36.323251Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:35:36.342252 waagent[1453]: 2024-02-09T18:35:36.342189Z INFO Daemon Daemon Starting provisioning Feb 9 18:35:36.348455 waagent[1453]: 2024-02-09T18:35:36.348379Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 18:35:36.354272 waagent[1453]: 2024-02-09T18:35:36.354207Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-a0f092b2b2] Feb 9 18:35:36.394213 waagent[1453]: 2024-02-09T18:35:36.394052Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-a0f092b2b2] Feb 9 18:35:36.402250 waagent[1453]: 2024-02-09T18:35:36.402143Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 18:35:36.410148 waagent[1453]: 2024-02-09T18:35:36.410073Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 18:35:36.427137 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 18:35:36.427323 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 18:35:36.427379 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 18:35:36.427599 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:35:36.432207 systemd-networkd[1223]: eth0: DHCPv6 lease lost Feb 9 18:35:36.433423 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:35:36.433585 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:35:36.435599 systemd[1]: Starting systemd-networkd.service... Feb 9 18:35:36.462381 systemd-networkd[1503]: enP31659s1: Link UP Feb 9 18:35:36.462393 systemd-networkd[1503]: enP31659s1: Gained carrier Feb 9 18:35:36.463322 systemd-networkd[1503]: eth0: Link UP Feb 9 18:35:36.463332 systemd-networkd[1503]: eth0: Gained carrier Feb 9 18:35:36.463645 systemd-networkd[1503]: lo: Link UP Feb 9 18:35:36.463655 systemd-networkd[1503]: lo: Gained carrier Feb 9 18:35:36.463876 systemd-networkd[1503]: eth0: Gained IPv6LL Feb 9 18:35:36.464958 systemd-networkd[1503]: Enumeration completed Feb 9 18:35:36.465096 systemd[1]: Started systemd-networkd.service. Feb 9 18:35:36.466768 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:35:36.466811 systemd-networkd[1503]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:35:36.470643 waagent[1453]: 2024-02-09T18:35:36.470472Z INFO Daemon Daemon Create user account if not exists Feb 9 18:35:36.477705 waagent[1453]: 2024-02-09T18:35:36.477626Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 18:35:36.484888 waagent[1453]: 2024-02-09T18:35:36.484810Z INFO Daemon Daemon Configure sudoer Feb 9 18:35:36.491147 waagent[1453]: 2024-02-09T18:35:36.491079Z INFO Daemon Daemon Configure sshd Feb 9 18:35:36.496235 systemd-networkd[1503]: eth0: DHCPv4 address 10.200.20.44/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:35:36.496341 waagent[1453]: 2024-02-09T18:35:36.496177Z INFO Daemon Daemon Deploy ssh public key. Feb 9 18:35:36.508582 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:35:37.722749 waagent[1453]: 2024-02-09T18:35:37.722678Z INFO Daemon Daemon Provisioning complete Feb 9 18:35:37.745083 waagent[1453]: 2024-02-09T18:35:37.745018Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 18:35:37.752352 waagent[1453]: 2024-02-09T18:35:37.752284Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 18:35:37.765011 waagent[1453]: 2024-02-09T18:35:37.764938Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 18:35:38.060833 waagent[1512]: 2024-02-09T18:35:38.060692Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 18:35:38.061899 waagent[1512]: 2024-02-09T18:35:38.061843Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:38.062136 waagent[1512]: 2024-02-09T18:35:38.062087Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:38.074566 waagent[1512]: 2024-02-09T18:35:38.074484Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 18:35:38.074900 waagent[1512]: 2024-02-09T18:35:38.074851Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 18:35:38.141110 waagent[1512]: 2024-02-09T18:35:38.140969Z INFO ExtHandler ExtHandler Found private key matching thumbprint B1B4C04372CB8FE30A7CA4044898D88DD0CD4BE8 Feb 9 18:35:38.141514 waagent[1512]: 2024-02-09T18:35:38.141460Z INFO ExtHandler ExtHandler Certificate with thumbprint A94911B38AA2D10D7B8211391C28BDBA6BCB4CAF has no matching private key. Feb 9 18:35:38.141828 waagent[1512]: 2024-02-09T18:35:38.141781Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 18:35:38.155415 waagent[1512]: 2024-02-09T18:35:38.155364Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 713dcee0-20a9-4817-9ca8-f251fbd5f3c5 New eTag: 7975300967808203579] Feb 9 18:35:38.156135 waagent[1512]: 2024-02-09T18:35:38.156081Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:35:38.228459 waagent[1512]: 2024-02-09T18:35:38.228323Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:35:38.252355 waagent[1512]: 2024-02-09T18:35:38.252274Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1512 Feb 9 18:35:38.256284 waagent[1512]: 2024-02-09T18:35:38.256221Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:35:38.257735 waagent[1512]: 2024-02-09T18:35:38.257678Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:35:38.351378 waagent[1512]: 2024-02-09T18:35:38.351268Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:35:38.351918 waagent[1512]: 2024-02-09T18:35:38.351865Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:35:38.359450 waagent[1512]: 2024-02-09T18:35:38.359399Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:35:38.360039 waagent[1512]: 2024-02-09T18:35:38.359986Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:35:38.361304 waagent[1512]: 2024-02-09T18:35:38.361243Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 18:35:38.362736 waagent[1512]: 2024-02-09T18:35:38.362669Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:35:38.363112 waagent[1512]: 2024-02-09T18:35:38.363040Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:38.363604 waagent[1512]: 2024-02-09T18:35:38.363533Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:38.364181 waagent[1512]: 2024-02-09T18:35:38.364105Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:35:38.364494 waagent[1512]: 2024-02-09T18:35:38.364435Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:35:38.364494 waagent[1512]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:35:38.364494 waagent[1512]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:35:38.364494 waagent[1512]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:35:38.364494 waagent[1512]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:38.364494 waagent[1512]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:38.364494 waagent[1512]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:38.366591 waagent[1512]: 2024-02-09T18:35:38.366434Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:35:38.366901 waagent[1512]: 2024-02-09T18:35:38.366830Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:38.367453 waagent[1512]: 2024-02-09T18:35:38.367376Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:38.368454 waagent[1512]: 2024-02-09T18:35:38.368378Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:35:38.368620 waagent[1512]: 2024-02-09T18:35:38.368569Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:35:38.368733 waagent[1512]: 2024-02-09T18:35:38.368689Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:35:38.369622 waagent[1512]: 2024-02-09T18:35:38.369562Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:35:38.369780 waagent[1512]: 2024-02-09T18:35:38.369714Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:35:38.370528 waagent[1512]: 2024-02-09T18:35:38.370438Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:35:38.370707 waagent[1512]: 2024-02-09T18:35:38.370637Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:35:38.371028 waagent[1512]: 2024-02-09T18:35:38.370959Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:35:38.381657 waagent[1512]: 2024-02-09T18:35:38.381585Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 18:35:38.383202 waagent[1512]: 2024-02-09T18:35:38.383130Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:35:38.384264 waagent[1512]: 2024-02-09T18:35:38.384208Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 18:35:38.410609 waagent[1512]: 2024-02-09T18:35:38.410480Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1503' Feb 9 18:35:38.456272 waagent[1512]: 2024-02-09T18:35:38.456193Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 18:35:38.492439 waagent[1512]: 2024-02-09T18:35:38.492304Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:35:38.492439 waagent[1512]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:35:38.492439 waagent[1512]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:35:38.492439 waagent[1512]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:4d:78 brd ff:ff:ff:ff:ff:ff Feb 9 18:35:38.492439 waagent[1512]: 3: enP31659s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:4d:78 brd ff:ff:ff:ff:ff:ff\ altname enP31659p0s2 Feb 9 18:35:38.492439 waagent[1512]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:35:38.492439 waagent[1512]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:35:38.492439 waagent[1512]: 2: eth0 inet 10.200.20.44/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:35:38.492439 waagent[1512]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:35:38.492439 waagent[1512]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:35:38.492439 waagent[1512]: 2: eth0 inet6 fe80::222:48ff:fe78:4d78/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:35:38.629947 waagent[1512]: 2024-02-09T18:35:38.629835Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 18:35:38.768552 waagent[1453]: 2024-02-09T18:35:38.768426Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 18:35:38.772237 waagent[1453]: 2024-02-09T18:35:38.772182Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 18:35:39.896394 waagent[1541]: 2024-02-09T18:35:39.896296Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 18:35:39.897431 waagent[1541]: 2024-02-09T18:35:39.897372Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 18:35:39.897668 waagent[1541]: 2024-02-09T18:35:39.897620Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 18:35:39.905480 waagent[1541]: 2024-02-09T18:35:39.905377Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:35:39.905979 waagent[1541]: 2024-02-09T18:35:39.905925Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:39.906258 waagent[1541]: 2024-02-09T18:35:39.906205Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:39.919081 waagent[1541]: 2024-02-09T18:35:39.919006Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 18:35:39.928366 waagent[1541]: 2024-02-09T18:35:39.928306Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 18:35:39.929558 waagent[1541]: 2024-02-09T18:35:39.929501Z INFO ExtHandler Feb 9 18:35:39.929800 waagent[1541]: 2024-02-09T18:35:39.929753Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 5a7f6ef9-bb0a-4f20-aef5-f7a8be0e9303 eTag: 7975300967808203579 source: Fabric] Feb 9 18:35:39.930639 waagent[1541]: 2024-02-09T18:35:39.930583Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 18:35:39.931950 waagent[1541]: 2024-02-09T18:35:39.931891Z INFO ExtHandler Feb 9 18:35:39.932193 waagent[1541]: 2024-02-09T18:35:39.932127Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 18:35:39.942396 waagent[1541]: 2024-02-09T18:35:39.942340Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 18:35:39.943044 waagent[1541]: 2024-02-09T18:35:39.942999Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:35:39.963711 waagent[1541]: 2024-02-09T18:35:39.963648Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 18:35:40.033840 waagent[1541]: 2024-02-09T18:35:40.033699Z INFO ExtHandler Downloaded certificate {'thumbprint': 'B1B4C04372CB8FE30A7CA4044898D88DD0CD4BE8', 'hasPrivateKey': True} Feb 9 18:35:40.035126 waagent[1541]: 2024-02-09T18:35:40.035065Z INFO ExtHandler Downloaded certificate {'thumbprint': 'A94911B38AA2D10D7B8211391C28BDBA6BCB4CAF', 'hasPrivateKey': False} Feb 9 18:35:40.036320 waagent[1541]: 2024-02-09T18:35:40.036260Z INFO ExtHandler Fetch goal state completed Feb 9 18:35:40.068103 waagent[1541]: 2024-02-09T18:35:40.068017Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1541 Feb 9 18:35:40.071838 waagent[1541]: 2024-02-09T18:35:40.071761Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:35:40.073489 waagent[1541]: 2024-02-09T18:35:40.073424Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:35:40.078384 waagent[1541]: 2024-02-09T18:35:40.078332Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:35:40.078911 waagent[1541]: 2024-02-09T18:35:40.078854Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:35:40.086532 waagent[1541]: 2024-02-09T18:35:40.086479Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:35:40.087138 waagent[1541]: 2024-02-09T18:35:40.087082Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:35:40.093060 waagent[1541]: 2024-02-09T18:35:40.092955Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 18:35:40.096877 waagent[1541]: 2024-02-09T18:35:40.096820Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 18:35:40.098529 waagent[1541]: 2024-02-09T18:35:40.098460Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:35:40.098774 waagent[1541]: 2024-02-09T18:35:40.098704Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:40.099203 waagent[1541]: 2024-02-09T18:35:40.099117Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:40.100127 waagent[1541]: 2024-02-09T18:35:40.100048Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:35:40.100492 waagent[1541]: 2024-02-09T18:35:40.100423Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:35:40.100492 waagent[1541]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:35:40.100492 waagent[1541]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:35:40.100492 waagent[1541]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:35:40.100492 waagent[1541]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:40.100492 waagent[1541]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:40.100492 waagent[1541]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:35:40.102728 waagent[1541]: 2024-02-09T18:35:40.102604Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:35:40.103339 waagent[1541]: 2024-02-09T18:35:40.103262Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:35:40.104220 waagent[1541]: 2024-02-09T18:35:40.103709Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:35:40.104438 waagent[1541]: 2024-02-09T18:35:40.104366Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:35:40.106823 waagent[1541]: 2024-02-09T18:35:40.106698Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:35:40.107058 waagent[1541]: 2024-02-09T18:35:40.106990Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:35:40.107321 waagent[1541]: 2024-02-09T18:35:40.107252Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:35:40.108777 waagent[1541]: 2024-02-09T18:35:40.108638Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:35:40.108950 waagent[1541]: 2024-02-09T18:35:40.108886Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:35:40.117465 waagent[1541]: 2024-02-09T18:35:40.115546Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:35:40.119425 waagent[1541]: 2024-02-09T18:35:40.119183Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:35:40.121424 waagent[1541]: 2024-02-09T18:35:40.121347Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:35:40.121424 waagent[1541]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:35:40.121424 waagent[1541]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:35:40.121424 waagent[1541]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:4d:78 brd ff:ff:ff:ff:ff:ff Feb 9 18:35:40.121424 waagent[1541]: 3: enP31659s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:78:4d:78 brd ff:ff:ff:ff:ff:ff\ altname enP31659p0s2 Feb 9 18:35:40.121424 waagent[1541]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:35:40.121424 waagent[1541]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:35:40.121424 waagent[1541]: 2: eth0 inet 10.200.20.44/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:35:40.121424 waagent[1541]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:35:40.121424 waagent[1541]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:35:40.121424 waagent[1541]: 2: eth0 inet6 fe80::222:48ff:fe78:4d78/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:35:40.139652 waagent[1541]: 2024-02-09T18:35:40.139558Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 18:35:40.140772 waagent[1541]: 2024-02-09T18:35:40.140706Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 18:35:40.159796 waagent[1541]: 2024-02-09T18:35:40.159699Z INFO ExtHandler ExtHandler Feb 9 18:35:40.160077 waagent[1541]: 2024-02-09T18:35:40.160024Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: d4d27b60-64b8-4f89-bd55-3d951c4aad17 correlation ad656aed-5354-4817-a09a-9662303f62c9 created: 2024-02-09T18:34:08.506134Z] Feb 9 18:35:40.161041 waagent[1541]: 2024-02-09T18:35:40.160985Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 18:35:40.162929 waagent[1541]: 2024-02-09T18:35:40.162876Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 9 18:35:40.195885 waagent[1541]: 2024-02-09T18:35:40.195802Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 18:35:40.219110 waagent[1541]: 2024-02-09T18:35:40.219016Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 60D7B863-F402-4EB8-AA2F-BA16ABB25903;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 18:35:40.337534 waagent[1541]: 2024-02-09T18:35:40.337405Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 18:35:40.337534 waagent[1541]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.337534 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.337534 waagent[1541]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.337534 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.337534 waagent[1541]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.337534 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.337534 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:35:40.337534 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:35:40.337534 waagent[1541]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:35:40.345010 waagent[1541]: 2024-02-09T18:35:40.344905Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 18:35:40.345010 waagent[1541]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.345010 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.345010 waagent[1541]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.345010 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.345010 waagent[1541]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:35:40.345010 waagent[1541]: pkts bytes target prot opt in out source destination Feb 9 18:35:40.345010 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:35:40.345010 waagent[1541]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:35:40.345010 waagent[1541]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:35:40.345882 waagent[1541]: 2024-02-09T18:35:40.345835Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 18:36:05.897480 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 18:36:12.003201 update_engine[1346]: I0209 18:36:12.003105 1346 update_attempter.cc:509] Updating boot flags... Feb 9 18:36:15.555961 systemd[1]: Created slice system-sshd.slice. Feb 9 18:36:15.557421 systemd[1]: Started sshd@0-10.200.20.44:22-10.200.12.6:59812.service. Feb 9 18:36:16.185515 sshd[1631]: Accepted publickey for core from 10.200.12.6 port 59812 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:16.201093 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:16.204792 systemd-logind[1343]: New session 3 of user core. Feb 9 18:36:16.205577 systemd[1]: Started session-3.scope. Feb 9 18:36:16.579725 systemd[1]: Started sshd@1-10.200.20.44:22-10.200.12.6:59822.service. Feb 9 18:36:17.031969 sshd[1636]: Accepted publickey for core from 10.200.12.6 port 59822 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:17.033555 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:17.037515 systemd[1]: Started session-4.scope. Feb 9 18:36:17.037915 systemd-logind[1343]: New session 4 of user core. Feb 9 18:36:17.357268 sshd[1636]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:17.359704 systemd[1]: sshd@1-10.200.20.44:22-10.200.12.6:59822.service: Deactivated successfully. Feb 9 18:36:17.360404 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 18:36:17.360929 systemd-logind[1343]: Session 4 logged out. Waiting for processes to exit. Feb 9 18:36:17.361857 systemd-logind[1343]: Removed session 4. Feb 9 18:36:17.427169 systemd[1]: Started sshd@2-10.200.20.44:22-10.200.12.6:43040.service. Feb 9 18:36:17.851301 sshd[1642]: Accepted publickey for core from 10.200.12.6 port 43040 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:17.852551 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:17.856217 systemd-logind[1343]: New session 5 of user core. Feb 9 18:36:17.856633 systemd[1]: Started session-5.scope. Feb 9 18:36:18.153783 sshd[1642]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:18.156312 systemd[1]: sshd@2-10.200.20.44:22-10.200.12.6:43040.service: Deactivated successfully. Feb 9 18:36:18.157005 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 18:36:18.157553 systemd-logind[1343]: Session 5 logged out. Waiting for processes to exit. Feb 9 18:36:18.158377 systemd-logind[1343]: Removed session 5. Feb 9 18:36:18.222443 systemd[1]: Started sshd@3-10.200.20.44:22-10.200.12.6:43050.service. Feb 9 18:36:18.640981 sshd[1651]: Accepted publickey for core from 10.200.12.6 port 43050 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:18.642290 sshd[1651]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:18.645992 systemd-logind[1343]: New session 6 of user core. Feb 9 18:36:18.646447 systemd[1]: Started session-6.scope. Feb 9 18:36:18.944661 sshd[1651]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:18.946995 systemd[1]: sshd@3-10.200.20.44:22-10.200.12.6:43050.service: Deactivated successfully. Feb 9 18:36:18.947674 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 18:36:18.948226 systemd-logind[1343]: Session 6 logged out. Waiting for processes to exit. Feb 9 18:36:18.949026 systemd-logind[1343]: Removed session 6. Feb 9 18:36:19.018807 systemd[1]: Started sshd@4-10.200.20.44:22-10.200.12.6:43064.service. Feb 9 18:36:19.468614 sshd[1657]: Accepted publickey for core from 10.200.12.6 port 43064 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:19.469842 sshd[1657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:19.473525 systemd-logind[1343]: New session 7 of user core. Feb 9 18:36:19.473927 systemd[1]: Started session-7.scope. Feb 9 18:36:19.976648 sudo[1660]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 18:36:19.976850 sudo[1660]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:36:20.002304 dbus-daemon[1328]: avc: received setenforce notice (enforcing=1) Feb 9 18:36:20.003238 sudo[1660]: pam_unix(sudo:session): session closed for user root Feb 9 18:36:20.090121 sshd[1657]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:20.093013 systemd-logind[1343]: Session 7 logged out. Waiting for processes to exit. Feb 9 18:36:20.093345 systemd[1]: sshd@4-10.200.20.44:22-10.200.12.6:43064.service: Deactivated successfully. Feb 9 18:36:20.094014 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 18:36:20.094719 systemd-logind[1343]: Removed session 7. Feb 9 18:36:20.165835 systemd[1]: Started sshd@5-10.200.20.44:22-10.200.12.6:43076.service. Feb 9 18:36:20.585286 sshd[1664]: Accepted publickey for core from 10.200.12.6 port 43076 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:20.586876 sshd[1664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:20.590203 systemd-logind[1343]: New session 8 of user core. Feb 9 18:36:20.590873 systemd[1]: Started session-8.scope. Feb 9 18:36:20.823853 sudo[1668]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 18:36:20.824359 sudo[1668]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:36:20.826924 sudo[1668]: pam_unix(sudo:session): session closed for user root Feb 9 18:36:20.830896 sudo[1667]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 18:36:20.831087 sudo[1667]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:36:20.838784 systemd[1]: Stopping audit-rules.service... Feb 9 18:36:20.844459 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 9 18:36:20.844553 kernel: audit: type=1305 audit(1707503780.838:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:36:20.838000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 18:36:20.844979 auditctl[1671]: No rules Feb 9 18:36:20.845412 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 18:36:20.845576 systemd[1]: Stopped audit-rules.service. Feb 9 18:36:20.846959 systemd[1]: Starting audit-rules.service... Feb 9 18:36:20.838000 audit[1671]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffd072d20 a2=420 a3=0 items=0 ppid=1 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:20.866061 augenrules[1688]: No rules Feb 9 18:36:20.867047 systemd[1]: Finished audit-rules.service. Feb 9 18:36:20.883173 kernel: audit: type=1300 audit(1707503780.838:171): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffd072d20 a2=420 a3=0 items=0 ppid=1 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:20.883383 sudo[1667]: pam_unix(sudo:session): session closed for user root Feb 9 18:36:20.838000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:36:20.892107 kernel: audit: type=1327 audit(1707503780.838:171): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 18:36:20.892208 kernel: audit: type=1131 audit(1707503780.843:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.910537 kernel: audit: type=1130 audit(1707503780.862:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.862000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.882000 audit[1667]: USER_END pid=1667 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.950126 kernel: audit: type=1106 audit(1707503780.882:174): pid=1667 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.950252 kernel: audit: type=1104 audit(1707503780.882:175): pid=1667 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.882000 audit[1667]: CRED_DISP pid=1667 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.970375 sshd[1664]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:20.970000 audit[1664]: USER_END pid=1664 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:20.973504 systemd-logind[1343]: Session 8 logged out. Waiting for processes to exit. Feb 9 18:36:20.974531 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 18:36:20.975123 systemd[1]: sshd@5-10.200.20.44:22-10.200.12.6:43076.service: Deactivated successfully. Feb 9 18:36:20.976786 systemd-logind[1343]: Removed session 8. Feb 9 18:36:20.970000 audit[1664]: CRED_DISP pid=1664 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.021476 kernel: audit: type=1106 audit(1707503780.970:176): pid=1664 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.021570 kernel: audit: type=1104 audit(1707503780.970:177): pid=1664 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.021601 kernel: audit: type=1131 audit(1707503780.970:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.44:22-10.200.12.6:43076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:20.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.44:22-10.200.12.6:43076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:21.018534 systemd[1]: Started sshd@6-10.200.20.44:22-10.200.12.6:43080.service. Feb 9 18:36:21.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.44:22-10.200.12.6:43080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:21.437000 audit[1694]: USER_ACCT pid=1694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.438702 sshd[1694]: Accepted publickey for core from 10.200.12.6 port 43080 ssh2: RSA SHA256:AExcTof2ms2RC04cAfR/26ykZOGA1PeppPBnNP0o6qE Feb 9 18:36:21.438000 audit[1694]: CRED_ACQ pid=1694 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.440277 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:36:21.438000 audit[1694]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffdff8230 a2=3 a3=1 items=0 ppid=1 pid=1694 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:21.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 18:36:21.444522 systemd[1]: Started session-9.scope. Feb 9 18:36:21.444844 systemd-logind[1343]: New session 9 of user core. Feb 9 18:36:21.447000 audit[1694]: USER_START pid=1694 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.448000 audit[1696]: CRED_ACQ pid=1696 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:21.675000 audit[1697]: USER_ACCT pid=1697 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:21.676779 sudo[1697]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 18:36:21.676977 sudo[1697]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 18:36:21.675000 audit[1697]: CRED_REFR pid=1697 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:21.677000 audit[1697]: USER_START pid=1697 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:22.334107 systemd[1]: Reloading. Feb 9 18:36:22.386301 /usr/lib/systemd/system-generators/torcx-generator[1726]: time="2024-02-09T18:36:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:36:22.386608 /usr/lib/systemd/system-generators/torcx-generator[1726]: time="2024-02-09T18:36:22Z" level=info msg="torcx already run" Feb 9 18:36:22.479310 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:36:22.479329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:36:22.494293 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.557000 audit: BPF prog-id=35 op=LOAD Feb 9 18:36:22.557000 audit: BPF prog-id=24 op=UNLOAD Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit: BPF prog-id=36 op=LOAD Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit: BPF prog-id=37 op=LOAD Feb 9 18:36:22.558000 audit: BPF prog-id=25 op=UNLOAD Feb 9 18:36:22.558000 audit: BPF prog-id=26 op=UNLOAD Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.558000 audit: BPF prog-id=38 op=LOAD Feb 9 18:36:22.559000 audit: BPF prog-id=29 op=UNLOAD Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit: BPF prog-id=39 op=LOAD Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit: BPF prog-id=40 op=LOAD Feb 9 18:36:22.559000 audit: BPF prog-id=30 op=UNLOAD Feb 9 18:36:22.559000 audit: BPF prog-id=31 op=UNLOAD Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit: BPF prog-id=41 op=LOAD Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.559000 audit: BPF prog-id=42 op=LOAD Feb 9 18:36:22.559000 audit: BPF prog-id=21 op=UNLOAD Feb 9 18:36:22.559000 audit: BPF prog-id=22 op=UNLOAD Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.560000 audit: BPF prog-id=43 op=LOAD Feb 9 18:36:22.560000 audit: BPF prog-id=34 op=UNLOAD Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit: BPF prog-id=44 op=LOAD Feb 9 18:36:22.561000 audit: BPF prog-id=28 op=UNLOAD Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.561000 audit: BPF prog-id=45 op=LOAD Feb 9 18:36:22.561000 audit: BPF prog-id=27 op=UNLOAD Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.563000 audit: BPF prog-id=46 op=LOAD Feb 9 18:36:22.563000 audit: BPF prog-id=32 op=UNLOAD Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit: BPF prog-id=47 op=LOAD Feb 9 18:36:22.565000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit: BPF prog-id=48 op=LOAD Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:22.565000 audit: BPF prog-id=49 op=LOAD Feb 9 18:36:22.565000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:36:22.565000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:36:22.573207 systemd[1]: Started kubelet.service. Feb 9 18:36:22.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:22.584289 systemd[1]: Starting coreos-metadata.service... Feb 9 18:36:22.626035 coreos-metadata[1794]: Feb 09 18:36:22.625 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:36:22.628920 coreos-metadata[1794]: Feb 09 18:36:22.628 INFO Fetch successful Feb 9 18:36:22.628920 coreos-metadata[1794]: Feb 09 18:36:22.628 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 18:36:22.630913 coreos-metadata[1794]: Feb 09 18:36:22.630 INFO Fetch successful Feb 9 18:36:22.630913 coreos-metadata[1794]: Feb 09 18:36:22.630 INFO Fetching http://168.63.129.16/machine/84bfe883-865c-4af1-857d-d8ebe135faea/4bdf8b17%2D4938%2D4b1a%2Dae1a%2D3723095f499f.%5Fci%2D3510.3.2%2Da%2Da0f092b2b2?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 18:36:22.632908 coreos-metadata[1794]: Feb 09 18:36:22.632 INFO Fetch successful Feb 9 18:36:22.633469 kubelet[1786]: E0209 18:36:22.633428 1786 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 9 18:36:22.635486 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 18:36:22.635618 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 18:36:22.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 18:36:22.669278 coreos-metadata[1794]: Feb 09 18:36:22.669 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:36:22.682117 coreos-metadata[1794]: Feb 09 18:36:22.682 INFO Fetch successful Feb 9 18:36:22.690477 systemd[1]: Finished coreos-metadata.service. Feb 9 18:36:22.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:25.983278 systemd[1]: Stopped kubelet.service. Feb 9 18:36:25.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:25.988804 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 9 18:36:25.988883 kernel: audit: type=1130 audit(1707503785.982:363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:25.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:26.032784 kernel: audit: type=1131 audit(1707503785.982:364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:26.042901 systemd[1]: Reloading. Feb 9 18:36:26.124291 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-09T18:36:26Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:36:26.124322 /usr/lib/systemd/system-generators/torcx-generator[1851]: time="2024-02-09T18:36:26Z" level=info msg="torcx already run" Feb 9 18:36:26.152096 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:36:26.152117 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:36:26.167223 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:36:26.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267645 kernel: audit: type=1400 audit(1707503786.231:365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267717 kernel: audit: type=1400 audit(1707503786.246:366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286914 kernel: audit: type=1400 audit(1707503786.246:367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286986 kernel: audit: type=1400 audit(1707503786.246:368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.312117 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:36:26.312210 kernel: audit: type=1400 audit(1707503786.246:369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.339925 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 18:36:26.340010 kernel: audit: type=1400 audit(1707503786.246:370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit: BPF prog-id=50 op=LOAD Feb 9 18:36:26.249000 audit: BPF prog-id=35 op=UNLOAD Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit: BPF prog-id=51 op=LOAD Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit: BPF prog-id=52 op=LOAD Feb 9 18:36:26.267000 audit: BPF prog-id=36 op=UNLOAD Feb 9 18:36:26.267000 audit: BPF prog-id=37 op=UNLOAD Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit: BPF prog-id=53 op=LOAD Feb 9 18:36:26.286000 audit: BPF prog-id=38 op=UNLOAD Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit: BPF prog-id=54 op=LOAD Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.305000 audit: BPF prog-id=55 op=LOAD Feb 9 18:36:26.305000 audit: BPF prog-id=39 op=UNLOAD Feb 9 18:36:26.305000 audit: BPF prog-id=40 op=UNLOAD Feb 9 18:36:26.305000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit: BPF prog-id=56 op=LOAD Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.361000 audit: BPF prog-id=57 op=LOAD Feb 9 18:36:26.361000 audit: BPF prog-id=41 op=UNLOAD Feb 9 18:36:26.361000 audit: BPF prog-id=42 op=UNLOAD Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.363000 audit: BPF prog-id=58 op=LOAD Feb 9 18:36:26.363000 audit: BPF prog-id=43 op=UNLOAD Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit: BPF prog-id=59 op=LOAD Feb 9 18:36:26.364000 audit: BPF prog-id=44 op=UNLOAD Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.365000 audit: BPF prog-id=60 op=LOAD Feb 9 18:36:26.365000 audit: BPF prog-id=45 op=UNLOAD Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.367000 audit: BPF prog-id=61 op=LOAD Feb 9 18:36:26.368000 audit: BPF prog-id=46 op=UNLOAD Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit: BPF prog-id=62 op=LOAD Feb 9 18:36:26.369000 audit: BPF prog-id=47 op=UNLOAD Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit: BPF prog-id=63 op=LOAD Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:26.370000 audit: BPF prog-id=64 op=LOAD Feb 9 18:36:26.370000 audit: BPF prog-id=48 op=UNLOAD Feb 9 18:36:26.370000 audit: BPF prog-id=49 op=UNLOAD Feb 9 18:36:26.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:26.401419 systemd[1]: Started kubelet.service. Feb 9 18:36:26.442331 kubelet[1910]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:36:26.442657 kubelet[1910]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 9 18:36:26.442709 kubelet[1910]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 18:36:26.442833 kubelet[1910]: I0209 18:36:26.442802 1910 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 18:36:27.667331 kubelet[1910]: I0209 18:36:27.667295 1910 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 9 18:36:27.667331 kubelet[1910]: I0209 18:36:27.667326 1910 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 18:36:27.667665 kubelet[1910]: I0209 18:36:27.667520 1910 server.go:895] "Client rotation is on, will bootstrap in background" Feb 9 18:36:27.670758 kubelet[1910]: I0209 18:36:27.670735 1910 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 18:36:27.675016 kubelet[1910]: W0209 18:36:27.674990 1910 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 18:36:27.676723 kubelet[1910]: I0209 18:36:27.676698 1910 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 18:36:27.676921 kubelet[1910]: I0209 18:36:27.676900 1910 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 18:36:27.677092 kubelet[1910]: I0209 18:36:27.677071 1910 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 9 18:36:27.677092 kubelet[1910]: I0209 18:36:27.677094 1910 topology_manager.go:138] "Creating topology manager with none policy" Feb 9 18:36:27.677247 kubelet[1910]: I0209 18:36:27.677102 1910 container_manager_linux.go:301] "Creating device plugin manager" Feb 9 18:36:27.677273 kubelet[1910]: I0209 18:36:27.677258 1910 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:36:27.677374 kubelet[1910]: I0209 18:36:27.677352 1910 kubelet.go:393] "Attempting to sync node with API server" Feb 9 18:36:27.677374 kubelet[1910]: I0209 18:36:27.677373 1910 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 18:36:27.677431 kubelet[1910]: I0209 18:36:27.677392 1910 kubelet.go:309] "Adding apiserver pod source" Feb 9 18:36:27.677431 kubelet[1910]: I0209 18:36:27.677404 1910 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 18:36:27.677980 kubelet[1910]: E0209 18:36:27.677950 1910 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:27.678031 kubelet[1910]: E0209 18:36:27.677995 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:27.678494 kubelet[1910]: I0209 18:36:27.678475 1910 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 18:36:27.678781 kubelet[1910]: W0209 18:36:27.678760 1910 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 18:36:27.679226 kubelet[1910]: I0209 18:36:27.679197 1910 server.go:1232] "Started kubelet" Feb 9 18:36:27.680104 kubelet[1910]: E0209 18:36:27.680088 1910 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 18:36:27.680240 kubelet[1910]: E0209 18:36:27.680228 1910 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 18:36:27.679000 audit[1910]: AVC avc: denied { mac_admin } for pid=1910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:27.679000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:36:27.679000 audit[1910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400072f260 a1=4000b15728 a2=400072f230 a3=25 items=0 ppid=1 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.679000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:36:27.679000 audit[1910]: AVC avc: denied { mac_admin } for pid=1910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:27.679000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:36:27.679000 audit[1910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bcf5e0 a1=4000b15740 a2=400072f380 a3=25 items=0 ppid=1 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.679000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:36:27.680751 kubelet[1910]: I0209 18:36:27.680497 1910 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 18:36:27.680751 kubelet[1910]: I0209 18:36:27.680539 1910 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 18:36:27.680751 kubelet[1910]: I0209 18:36:27.680593 1910 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 18:36:27.683129 kubelet[1910]: I0209 18:36:27.683109 1910 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 18:36:27.683813 kubelet[1910]: I0209 18:36:27.683796 1910 server.go:462] "Adding debug handlers to kubelet server" Feb 9 18:36:27.684858 kubelet[1910]: I0209 18:36:27.684839 1910 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 9 18:36:27.685096 kubelet[1910]: I0209 18:36:27.685085 1910 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 9 18:36:27.684000 audit[1920]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.684000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffee49c0b0 a2=0 a3=1 items=0 ppid=1910 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.684000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:36:27.686000 audit[1921]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1921 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.686000 audit[1921]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffc456e6b0 a2=0 a3=1 items=0 ppid=1910 pid=1921 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.686000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:36:27.688834 kubelet[1910]: I0209 18:36:27.688801 1910 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 9 18:36:27.689230 kubelet[1910]: E0209 18:36:27.689101 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ed4000c6", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 679154374, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 679154374, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.688000 audit[1923]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.688000 audit[1923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe950fec0 a2=0 a3=1 items=0 ppid=1910 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.688000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:36:27.690869 kubelet[1910]: I0209 18:36:27.690829 1910 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 18:36:27.690937 kubelet[1910]: I0209 18:36:27.690898 1910 reconciler_new.go:29] "Reconciler: start to sync state" Feb 9 18:36:27.690000 audit[1925]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.690000 audit[1925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffcbfa85e0 a2=0 a3=1 items=0 ppid=1910 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:36:27.705565 kubelet[1910]: E0209 18:36:27.705491 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ed503cc7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 680218311, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 680218311, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.705780 kubelet[1910]: E0209 18:36:27.705765 1910 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 9 18:36:27.705951 kubelet[1910]: W0209 18:36:27.705939 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:36:27.706053 kubelet[1910]: E0209 18:36:27.706044 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.44" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 18:36:27.706144 kubelet[1910]: W0209 18:36:27.706132 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:36:27.706231 kubelet[1910]: E0209 18:36:27.706221 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:36:27.709193 kubelet[1910]: W0209 18:36:27.709177 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:36:27.709297 kubelet[1910]: E0209 18:36:27.709285 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:36:27.710686 kubelet[1910]: I0209 18:36:27.710663 1910 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 18:36:27.710808 kubelet[1910]: I0209 18:36:27.710794 1910 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 18:36:27.710887 kubelet[1910]: I0209 18:36:27.710878 1910 state_mem.go:36] "Initialized new in-memory state store" Feb 9 18:36:27.711134 kubelet[1910]: E0209 18:36:27.711051 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef11ecc1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709689025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709689025, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.712744 kubelet[1910]: E0209 18:36:27.712680 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef1201d9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709694425, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709694425, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.713386 kubelet[1910]: E0209 18:36:27.713318 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef120cc9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709697225, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709697225, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.716670 kubelet[1910]: I0209 18:36:27.716653 1910 policy_none.go:49] "None policy: Start" Feb 9 18:36:27.717425 kubelet[1910]: I0209 18:36:27.717395 1910 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 18:36:27.717425 kubelet[1910]: I0209 18:36:27.717426 1910 state_mem.go:35] "Initializing new in-memory state store" Feb 9 18:36:27.727844 systemd[1]: Created slice kubepods.slice. Feb 9 18:36:27.731000 audit[1934]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.731000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc91173f0 a2=0 a3=1 items=0 ppid=1910 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.731000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 18:36:27.732566 kubelet[1910]: I0209 18:36:27.732538 1910 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 9 18:36:27.731000 audit[1935]: NETFILTER_CFG table=mangle:10 family=10 entries=2 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:27.731000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcef33e40 a2=0 a3=1 items=0 ppid=1910 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.731000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 18:36:27.733602 kubelet[1910]: I0209 18:36:27.733432 1910 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 9 18:36:27.733602 kubelet[1910]: I0209 18:36:27.733456 1910 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 9 18:36:27.733602 kubelet[1910]: I0209 18:36:27.733471 1910 kubelet.go:2303] "Starting kubelet main sync loop" Feb 9 18:36:27.733602 kubelet[1910]: E0209 18:36:27.733512 1910 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 9 18:36:27.733000 audit[1936]: NETFILTER_CFG table=mangle:11 family=2 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.733000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe1e0d760 a2=0 a3=1 items=0 ppid=1910 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.733000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:36:27.734459 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 18:36:27.734000 audit[1937]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:27.734000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff83a77b0 a2=0 a3=1 items=0 ppid=1910 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.734000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 18:36:27.735000 audit[1938]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.735000 audit[1938]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffffcaa8da0 a2=0 a3=1 items=0 ppid=1910 pid=1938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:36:27.736000 audit[1939]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:27.736000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcff34de0 a2=0 a3=1 items=0 ppid=1910 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 18:36:27.738146 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 18:36:27.737000 audit[1940]: NETFILTER_CFG table=filter:15 family=10 entries=2 op=nft_register_chain pid=1940 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:27.737000 audit[1940]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe3d6ef10 a2=0 a3=1 items=0 ppid=1910 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.737000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:36:27.738970 kubelet[1910]: W0209 18:36:27.738787 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:36:27.738970 kubelet[1910]: E0209 18:36:27.738807 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 18:36:27.738000 audit[1941]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:27.738000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfaf8b50 a2=0 a3=1 items=0 ppid=1910 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 18:36:27.748864 kubelet[1910]: I0209 18:36:27.748844 1910 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 18:36:27.747000 audit[1910]: AVC avc: denied { mac_admin } for pid=1910 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:27.747000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 18:36:27.747000 audit[1910]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f3e330 a1=4000e73da0 a2=4000f3e300 a3=25 items=0 ppid=1 pid=1910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:27.747000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 18:36:27.749065 kubelet[1910]: I0209 18:36:27.748912 1910 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 18:36:27.749065 kubelet[1910]: I0209 18:36:27.749058 1910 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 18:36:27.750114 kubelet[1910]: E0209 18:36:27.750062 1910 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.44\" not found" Feb 9 18:36:27.751264 kubelet[1910]: E0209 18:36:27.751194 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5f17dc5d7", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 750311383, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 750311383, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.789685 kubelet[1910]: I0209 18:36:27.789665 1910 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 18:36:27.790830 kubelet[1910]: E0209 18:36:27.790815 1910 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 18:36:27.791278 kubelet[1910]: E0209 18:36:27.791216 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef11ecc1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709689025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 789618987, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef11ecc1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.792096 kubelet[1910]: E0209 18:36:27.792046 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef1201d9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709694425, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 789623906, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef1201d9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.792996 kubelet[1910]: E0209 18:36:27.792919 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef120cc9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709697225, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 789631146, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef120cc9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.907502 kubelet[1910]: E0209 18:36:27.907481 1910 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 9 18:36:27.992503 kubelet[1910]: I0209 18:36:27.992484 1910 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 18:36:27.993643 kubelet[1910]: E0209 18:36:27.993574 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef11ecc1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709689025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 992427883, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef11ecc1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.993793 kubelet[1910]: E0209 18:36:27.993766 1910 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 18:36:27.994658 kubelet[1910]: E0209 18:36:27.994598 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef1201d9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709694425, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 992452280, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef1201d9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:27.995359 kubelet[1910]: E0209 18:36:27.995302 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef120cc9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709697225, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 992455760, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef120cc9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:28.309357 kubelet[1910]: E0209 18:36:28.309264 1910 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.44\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 9 18:36:28.395332 kubelet[1910]: I0209 18:36:28.395310 1910 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 18:36:28.396620 kubelet[1910]: E0209 18:36:28.396546 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef11ecc1", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.44 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709689025, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 28, 395266432, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef11ecc1" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:28.396976 kubelet[1910]: E0209 18:36:28.396609 1910 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.44" Feb 9 18:36:28.397465 kubelet[1910]: E0209 18:36:28.397414 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef1201d9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.44 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709694425, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 28, 395279231, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef1201d9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:28.401127 kubelet[1910]: E0209 18:36:28.398236 1910 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44.17b245a5ef120cc9", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.44", UID:"10.200.20.44", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.44 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.44"}, FirstTimestamp:time.Date(2024, time.February, 9, 18, 36, 27, 709697225, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 18, 36, 28, 395282350, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.44"}': 'events "10.200.20.44.17b245a5ef120cc9" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 18:36:28.584877 kubelet[1910]: W0209 18:36:28.584760 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:36:28.584877 kubelet[1910]: E0209 18:36:28.584805 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 18:36:28.601149 kubelet[1910]: W0209 18:36:28.601122 1910 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:36:28.601149 kubelet[1910]: E0209 18:36:28.601151 1910 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 18:36:28.670369 kubelet[1910]: I0209 18:36:28.670347 1910 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 18:36:28.678722 kubelet[1910]: E0209 18:36:28.678694 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:29.060667 kubelet[1910]: E0209 18:36:29.060622 1910 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.44" not found Feb 9 18:36:29.113274 kubelet[1910]: E0209 18:36:29.113246 1910 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.44\" not found" node="10.200.20.44" Feb 9 18:36:29.197852 kubelet[1910]: I0209 18:36:29.197829 1910 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.44" Feb 9 18:36:29.201882 kubelet[1910]: I0209 18:36:29.201852 1910 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.44" Feb 9 18:36:29.217017 kubelet[1910]: I0209 18:36:29.217001 1910 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 18:36:29.217414 env[1358]: time="2024-02-09T18:36:29.217373379Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 18:36:29.217693 kubelet[1910]: I0209 18:36:29.217576 1910 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 18:36:29.415000 audit[1697]: USER_END pid=1697 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:29.415000 audit[1697]: CRED_DISP pid=1697 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 18:36:29.415308 sudo[1697]: pam_unix(sudo:session): session closed for user root Feb 9 18:36:29.480370 sshd[1694]: pam_unix(sshd:session): session closed for user core Feb 9 18:36:29.481000 audit[1694]: USER_END pid=1694 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:29.481000 audit[1694]: CRED_DISP pid=1694 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 18:36:29.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.44:22-10.200.12.6:43080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:36:29.482745 systemd[1]: sshd@6-10.200.20.44:22-10.200.12.6:43080.service: Deactivated successfully. Feb 9 18:36:29.483441 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 18:36:29.484012 systemd-logind[1343]: Session 9 logged out. Waiting for processes to exit. Feb 9 18:36:29.484983 systemd-logind[1343]: Removed session 9. Feb 9 18:36:29.679796 kubelet[1910]: E0209 18:36:29.679468 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:29.679796 kubelet[1910]: I0209 18:36:29.679473 1910 apiserver.go:52] "Watching apiserver" Feb 9 18:36:29.682735 kubelet[1910]: I0209 18:36:29.682707 1910 topology_manager.go:215] "Topology Admit Handler" podUID="1d2cf888-07cf-4fb9-85f2-86536c7dcd89" podNamespace="calico-system" podName="calico-node-8sdh4" Feb 9 18:36:29.684896 kubelet[1910]: I0209 18:36:29.684867 1910 topology_manager.go:215] "Topology Admit Handler" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" podNamespace="calico-system" podName="csi-node-driver-kt6ql" Feb 9 18:36:29.684980 kubelet[1910]: I0209 18:36:29.684938 1910 topology_manager.go:215] "Topology Admit Handler" podUID="f3b2263c-5a08-4947-a99b-3eaa3fe4dd67" podNamespace="kube-system" podName="kube-proxy-sgl47" Feb 9 18:36:29.685826 kubelet[1910]: E0209 18:36:29.685798 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:29.689698 systemd[1]: Created slice kubepods-besteffort-podf3b2263c_5a08_4947_a99b_3eaa3fe4dd67.slice. Feb 9 18:36:29.691351 kubelet[1910]: I0209 18:36:29.691319 1910 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 18:36:29.697893 systemd[1]: Created slice kubepods-besteffort-pod1d2cf888_07cf_4fb9_85f2_86536c7dcd89.slice. Feb 9 18:36:29.699272 kubelet[1910]: I0209 18:36:29.699246 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-policysync\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699327 kubelet[1910]: I0209 18:36:29.699283 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/31f785c1-8e39-457a-b7c7-c3ade25ed512-socket-dir\") pod \"csi-node-driver-kt6ql\" (UID: \"31f785c1-8e39-457a-b7c7-c3ade25ed512\") " pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:29.699327 kubelet[1910]: I0209 18:36:29.699306 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vkzdk\" (UniqueName: \"kubernetes.io/projected/f3b2263c-5a08-4947-a99b-3eaa3fe4dd67-kube-api-access-vkzdk\") pod \"kube-proxy-sgl47\" (UID: \"f3b2263c-5a08-4947-a99b-3eaa3fe4dd67\") " pod="kube-system/kube-proxy-sgl47" Feb 9 18:36:29.699327 kubelet[1910]: I0209 18:36:29.699324 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-lib-modules\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699408 kubelet[1910]: I0209 18:36:29.699341 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-tigera-ca-bundle\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699408 kubelet[1910]: I0209 18:36:29.699359 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-var-run-calico\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699408 kubelet[1910]: I0209 18:36:29.699376 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-flexvol-driver-host\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699408 kubelet[1910]: I0209 18:36:29.699395 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/31f785c1-8e39-457a-b7c7-c3ade25ed512-kubelet-dir\") pod \"csi-node-driver-kt6ql\" (UID: \"31f785c1-8e39-457a-b7c7-c3ade25ed512\") " pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:29.699490 kubelet[1910]: I0209 18:36:29.699414 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f3b2263c-5a08-4947-a99b-3eaa3fe4dd67-lib-modules\") pod \"kube-proxy-sgl47\" (UID: \"f3b2263c-5a08-4947-a99b-3eaa3fe4dd67\") " pod="kube-system/kube-proxy-sgl47" Feb 9 18:36:29.699490 kubelet[1910]: I0209 18:36:29.699433 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/31f785c1-8e39-457a-b7c7-c3ade25ed512-registration-dir\") pod \"csi-node-driver-kt6ql\" (UID: \"31f785c1-8e39-457a-b7c7-c3ade25ed512\") " pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:29.699490 kubelet[1910]: I0209 18:36:29.699453 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-xtables-lock\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699490 kubelet[1910]: I0209 18:36:29.699470 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-node-certs\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699573 kubelet[1910]: I0209 18:36:29.699492 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-var-lib-calico\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699573 kubelet[1910]: I0209 18:36:29.699510 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-cni-net-dir\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699573 kubelet[1910]: I0209 18:36:29.699528 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-cni-log-dir\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699573 kubelet[1910]: I0209 18:36:29.699547 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vtff\" (UniqueName: \"kubernetes.io/projected/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-kube-api-access-2vtff\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699573 kubelet[1910]: I0209 18:36:29.699574 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/31f785c1-8e39-457a-b7c7-c3ade25ed512-varrun\") pod \"csi-node-driver-kt6ql\" (UID: \"31f785c1-8e39-457a-b7c7-c3ade25ed512\") " pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:29.699683 kubelet[1910]: I0209 18:36:29.699594 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1d2cf888-07cf-4fb9-85f2-86536c7dcd89-cni-bin-dir\") pod \"calico-node-8sdh4\" (UID: \"1d2cf888-07cf-4fb9-85f2-86536c7dcd89\") " pod="calico-system/calico-node-8sdh4" Feb 9 18:36:29.699683 kubelet[1910]: I0209 18:36:29.699614 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tzjmq\" (UniqueName: \"kubernetes.io/projected/31f785c1-8e39-457a-b7c7-c3ade25ed512-kube-api-access-tzjmq\") pod \"csi-node-driver-kt6ql\" (UID: \"31f785c1-8e39-457a-b7c7-c3ade25ed512\") " pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:29.699683 kubelet[1910]: I0209 18:36:29.699631 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f3b2263c-5a08-4947-a99b-3eaa3fe4dd67-kube-proxy\") pod \"kube-proxy-sgl47\" (UID: \"f3b2263c-5a08-4947-a99b-3eaa3fe4dd67\") " pod="kube-system/kube-proxy-sgl47" Feb 9 18:36:29.699683 kubelet[1910]: I0209 18:36:29.699648 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f3b2263c-5a08-4947-a99b-3eaa3fe4dd67-xtables-lock\") pod \"kube-proxy-sgl47\" (UID: \"f3b2263c-5a08-4947-a99b-3eaa3fe4dd67\") " pod="kube-system/kube-proxy-sgl47" Feb 9 18:36:29.807655 kubelet[1910]: E0209 18:36:29.807628 1910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:36:29.807655 kubelet[1910]: W0209 18:36:29.807649 1910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:36:29.807807 kubelet[1910]: E0209 18:36:29.807667 1910 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:36:29.818861 kubelet[1910]: E0209 18:36:29.815594 1910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:36:29.818861 kubelet[1910]: W0209 18:36:29.815614 1910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:36:29.818861 kubelet[1910]: E0209 18:36:29.815629 1910 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:36:29.821276 kubelet[1910]: E0209 18:36:29.821253 1910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:36:29.821276 kubelet[1910]: W0209 18:36:29.821271 1910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:36:29.821396 kubelet[1910]: E0209 18:36:29.821286 1910 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:36:29.825045 kubelet[1910]: E0209 18:36:29.824978 1910 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 18:36:29.825045 kubelet[1910]: W0209 18:36:29.824996 1910 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 18:36:29.825045 kubelet[1910]: E0209 18:36:29.825009 1910 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 18:36:29.998076 env[1358]: time="2024-02-09T18:36:29.997611166Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sgl47,Uid:f3b2263c-5a08-4947-a99b-3eaa3fe4dd67,Namespace:kube-system,Attempt:0,}" Feb 9 18:36:30.005748 env[1358]: time="2024-02-09T18:36:30.005608410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8sdh4,Uid:1d2cf888-07cf-4fb9-85f2-86536c7dcd89,Namespace:calico-system,Attempt:0,}" Feb 9 18:36:30.679621 kubelet[1910]: E0209 18:36:30.679574 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:31.679925 kubelet[1910]: E0209 18:36:31.679868 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:31.735202 kubelet[1910]: E0209 18:36:31.734829 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:31.814815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3248123983.mount: Deactivated successfully. Feb 9 18:36:31.847697 env[1358]: time="2024-02-09T18:36:31.847643362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.853245 env[1358]: time="2024-02-09T18:36:31.853214961Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.869329 env[1358]: time="2024-02-09T18:36:31.869292452Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.884793 env[1358]: time="2024-02-09T18:36:31.884748196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.888681 env[1358]: time="2024-02-09T18:36:31.888652379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.892852 env[1358]: time="2024-02-09T18:36:31.892812620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.902214 env[1358]: time="2024-02-09T18:36:31.902185250Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.902928 env[1358]: time="2024-02-09T18:36:31.902905748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:31.998525 env[1358]: time="2024-02-09T18:36:31.998439253Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:36:31.998525 env[1358]: time="2024-02-09T18:36:31.998484769Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:36:31.998697 env[1358]: time="2024-02-09T18:36:31.998494728Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:36:31.998697 env[1358]: time="2024-02-09T18:36:31.998642956Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e pid=1961 runtime=io.containerd.runc.v2 Feb 9 18:36:32.005249 env[1358]: time="2024-02-09T18:36:32.005122325Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:36:32.005249 env[1358]: time="2024-02-09T18:36:32.005199879Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:36:32.005249 env[1358]: time="2024-02-09T18:36:32.005210598Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:36:32.005649 env[1358]: time="2024-02-09T18:36:32.005610964Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bfc7b75c535090fcfd9ccf77b6a500324382dcc12a58b098a46438846f213cf0 pid=1976 runtime=io.containerd.runc.v2 Feb 9 18:36:32.015554 systemd[1]: Started cri-containerd-bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e.scope. Feb 9 18:36:32.023968 systemd[1]: Started cri-containerd-bfc7b75c535090fcfd9ccf77b6a500324382dcc12a58b098a46438846f213cf0.scope. Feb 9 18:36:32.057199 kernel: kauditd_printk_skb: 228 callbacks suppressed Feb 9 18:36:32.057281 kernel: audit: type=1400 audit(1707503792.030:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.082034 kernel: audit: type=1400 audit(1707503792.030:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.082144 kernel: audit: type=1400 audit(1707503792.030:555): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.119999 kernel: audit: type=1400 audit(1707503792.030:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.152603 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 9 18:36:32.152697 kernel: audit: type=1400 audit(1707503792.030:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.152715 kernel: audit: audit_lost=6 audit_rate_limit=0 audit_backlog_limit=64 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.179989 kernel: audit: type=1400 audit(1707503792.030:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.180082 kernel: audit: backlog limit exceeded Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.185012 kernel: audit: type=1400 audit(1707503792.030:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.036000 audit: BPF prog-id=65 op=LOAD Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1961 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323335323035636230383866393936613539363562613836393030 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1961 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323335323035636230383866393936613539363562613836393030 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.056000 audit: BPF prog-id=66 op=LOAD Feb 9 18:36:32.056000 audit[1983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1961 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323335323035636230383866393936613539363562613836393030 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.081000 audit: BPF prog-id=67 op=LOAD Feb 9 18:36:32.081000 audit[1983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1961 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323335323035636230383866393936613539363562613836393030 Feb 9 18:36:32.098000 audit: BPF prog-id=67 op=UNLOAD Feb 9 18:36:32.098000 audit: BPF prog-id=66 op=UNLOAD Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { perfmon } for pid=1983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit[1983]: AVC avc: denied { bpf } for pid=1983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.098000 audit: BPF prog-id=68 op=LOAD Feb 9 18:36:32.098000 audit[1983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1961 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266323335323035636230383866393936613539363562613836393030 Feb 9 18:36:32.183000 audit: BPF prog-id=69 op=LOAD Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1976 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633762373563353335303930666366643963636637376236613530 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1976 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633762373563353335303930666366643963636637376236613530 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit: BPF prog-id=70 op=LOAD Feb 9 18:36:32.203000 audit[1996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1976 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633762373563353335303930666366643963636637376236613530 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit: BPF prog-id=71 op=LOAD Feb 9 18:36:32.203000 audit[1996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1976 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633762373563353335303930666366643963636637376236613530 Feb 9 18:36:32.203000 audit: BPF prog-id=71 op=UNLOAD Feb 9 18:36:32.203000 audit: BPF prog-id=70 op=UNLOAD Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { perfmon } for pid=1996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit[1996]: AVC avc: denied { bpf } for pid=1996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:32.203000 audit: BPF prog-id=72 op=LOAD Feb 9 18:36:32.203000 audit[1996]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1976 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:32.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266633762373563353335303930666366643963636637376236613530 Feb 9 18:36:32.222816 env[1358]: time="2024-02-09T18:36:32.221763995Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sgl47,Uid:f3b2263c-5a08-4947-a99b-3eaa3fe4dd67,Namespace:kube-system,Attempt:0,} returns sandbox id \"bfc7b75c535090fcfd9ccf77b6a500324382dcc12a58b098a46438846f213cf0\"" Feb 9 18:36:32.222816 env[1358]: time="2024-02-09T18:36:32.221934501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8sdh4,Uid:1d2cf888-07cf-4fb9-85f2-86536c7dcd89,Namespace:calico-system,Attempt:0,} returns sandbox id \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\"" Feb 9 18:36:32.224485 env[1358]: time="2024-02-09T18:36:32.224449009Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 18:36:32.680677 kubelet[1910]: E0209 18:36:32.680618 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:33.680947 kubelet[1910]: E0209 18:36:33.680914 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:33.713404 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2869690164.mount: Deactivated successfully. Feb 9 18:36:33.735196 kubelet[1910]: E0209 18:36:33.734500 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:34.681745 kubelet[1910]: E0209 18:36:34.681711 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:35.094929 env[1358]: time="2024-02-09T18:36:35.094879017Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:35.102692 env[1358]: time="2024-02-09T18:36:35.102661254Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:35.110765 env[1358]: time="2024-02-09T18:36:35.110736589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:35.118180 env[1358]: time="2024-02-09T18:36:35.118128456Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:35.118663 env[1358]: time="2024-02-09T18:36:35.118632977Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 18:36:35.119694 env[1358]: time="2024-02-09T18:36:35.119227411Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 9 18:36:35.120917 env[1358]: time="2024-02-09T18:36:35.120887483Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 18:36:35.156143 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount751629170.mount: Deactivated successfully. Feb 9 18:36:35.174336 env[1358]: time="2024-02-09T18:36:35.174279987Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153\"" Feb 9 18:36:35.175078 env[1358]: time="2024-02-09T18:36:35.175044648Z" level=info msg="StartContainer for \"50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153\"" Feb 9 18:36:35.195118 systemd[1]: run-containerd-runc-k8s.io-50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153-runc.rOFeTo.mount: Deactivated successfully. Feb 9 18:36:35.196334 systemd[1]: Started cri-containerd-50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153.scope. Feb 9 18:36:35.210000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.210000 audit[2043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1961 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:35.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643639326134616639626439643732393234363631663965653930 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit: BPF prog-id=73 op=LOAD Feb 9 18:36:35.211000 audit[2043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1961 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:35.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643639326134616639626439643732393234363631663965653930 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.211000 audit: BPF prog-id=74 op=LOAD Feb 9 18:36:35.211000 audit[2043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1961 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:35.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643639326134616639626439643732393234363631663965653930 Feb 9 18:36:35.212000 audit: BPF prog-id=74 op=UNLOAD Feb 9 18:36:35.212000 audit: BPF prog-id=73 op=UNLOAD Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:35.212000 audit: BPF prog-id=75 op=LOAD Feb 9 18:36:35.212000 audit[2043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1961 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:35.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643639326134616639626439643732393234363631663965653930 Feb 9 18:36:35.229851 systemd[1]: cri-containerd-50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153.scope: Deactivated successfully. Feb 9 18:36:35.232000 audit: BPF prog-id=75 op=UNLOAD Feb 9 18:36:35.234052 env[1358]: time="2024-02-09T18:36:35.234002922Z" level=info msg="StartContainer for \"50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153\" returns successfully" Feb 9 18:36:35.351602 env[1358]: time="2024-02-09T18:36:35.351483023Z" level=info msg="shim disconnected" id=50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153 Feb 9 18:36:35.351602 env[1358]: time="2024-02-09T18:36:35.351530459Z" level=warning msg="cleaning up after shim disconnected" id=50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153 namespace=k8s.io Feb 9 18:36:35.351602 env[1358]: time="2024-02-09T18:36:35.351539899Z" level=info msg="cleaning up dead shim" Feb 9 18:36:35.359481 env[1358]: time="2024-02-09T18:36:35.359444166Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:36:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2082 runtime=io.containerd.runc.v2\n" Feb 9 18:36:35.682945 kubelet[1910]: E0209 18:36:35.682824 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:35.734588 kubelet[1910]: E0209 18:36:35.734294 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:36.154504 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50d692a4af9bd9d72924661f9ee906c07a4277cede1ffad54929857e7ce1d153-rootfs.mount: Deactivated successfully. Feb 9 18:36:36.256763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1190647557.mount: Deactivated successfully. Feb 9 18:36:36.683916 kubelet[1910]: E0209 18:36:36.683876 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:36.719464 env[1358]: time="2024-02-09T18:36:36.719392802Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:36.732623 env[1358]: time="2024-02-09T18:36:36.732576968Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:36.738734 env[1358]: time="2024-02-09T18:36:36.738694707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:36.749944 env[1358]: time="2024-02-09T18:36:36.749903062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:36.750318 env[1358]: time="2024-02-09T18:36:36.750288393Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 9 18:36:36.751236 env[1358]: time="2024-02-09T18:36:36.750819033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 18:36:36.752408 env[1358]: time="2024-02-09T18:36:36.752379035Z" level=info msg="CreateContainer within sandbox \"bfc7b75c535090fcfd9ccf77b6a500324382dcc12a58b098a46438846f213cf0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 18:36:36.796662 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2418788969.mount: Deactivated successfully. Feb 9 18:36:36.830888 env[1358]: time="2024-02-09T18:36:36.830833881Z" level=info msg="CreateContainer within sandbox \"bfc7b75c535090fcfd9ccf77b6a500324382dcc12a58b098a46438846f213cf0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"9b10bd246b2254257a0a262e53bd417356fee8fcf69d15faa37351a6f2f4aaa0\"" Feb 9 18:36:36.831452 env[1358]: time="2024-02-09T18:36:36.831418677Z" level=info msg="StartContainer for \"9b10bd246b2254257a0a262e53bd417356fee8fcf69d15faa37351a6f2f4aaa0\"" Feb 9 18:36:36.845868 systemd[1]: Started cri-containerd-9b10bd246b2254257a0a262e53bd417356fee8fcf69d15faa37351a6f2f4aaa0.scope. Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1976 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313062643234366232323534323537613061323632653533626434 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.859000 audit: BPF prog-id=76 op=LOAD Feb 9 18:36:36.859000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1976 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313062643234366232323534323537613061323632653533626434 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.860000 audit: BPF prog-id=77 op=LOAD Feb 9 18:36:36.860000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1976 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313062643234366232323534323537613061323632653533626434 Feb 9 18:36:36.860000 audit: BPF prog-id=77 op=UNLOAD Feb 9 18:36:36.860000 audit: BPF prog-id=76 op=UNLOAD Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { perfmon } for pid=2106 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit[2106]: AVC avc: denied { bpf } for pid=2106 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:36.861000 audit: BPF prog-id=78 op=LOAD Feb 9 18:36:36.861000 audit[2106]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1976 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962313062643234366232323534323537613061323632653533626434 Feb 9 18:36:36.882228 env[1358]: time="2024-02-09T18:36:36.882142613Z" level=info msg="StartContainer for \"9b10bd246b2254257a0a262e53bd417356fee8fcf69d15faa37351a6f2f4aaa0\" returns successfully" Feb 9 18:36:36.928000 audit[2155]: NETFILTER_CFG table=mangle:17 family=10 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:36.928000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2f33b70 a2=0 a3=ffff8e28d6c0 items=0 ppid=2117 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.928000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:36:36.929000 audit[2156]: NETFILTER_CFG table=nat:18 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:36.929000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec27ccb0 a2=0 a3=ffff8f4c06c0 items=0 ppid=2117 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:36:36.930000 audit[2157]: NETFILTER_CFG table=filter:19 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:36.930000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd160f0e0 a2=0 a3=ffff92c956c0 items=0 ppid=2117 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.930000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:36:36.931000 audit[2158]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:36.931000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9440da0 a2=0 a3=ffffb3b456c0 items=0 ppid=2117 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.931000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 18:36:36.932000 audit[2159]: NETFILTER_CFG table=nat:21 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:36.932000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc817a00 a2=0 a3=ffff819e46c0 items=0 ppid=2117 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 18:36:36.933000 audit[2160]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:36.933000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe703f060 a2=0 a3=ffff985c46c0 items=0 ppid=2117 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:36.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 18:36:37.029000 audit[2161]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.029000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffccbaa720 a2=0 a3=ffff830c36c0 items=0 ppid=2117 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:36:37.032000 audit[2163]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.039007 kernel: kauditd_printk_skb: 214 callbacks suppressed Feb 9 18:36:37.039092 kernel: audit: type=1325 audit(1707503797.032:608): table=filter:24 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.032000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe11987f0 a2=0 a3=ffff950e96c0 items=0 ppid=2117 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.085607 kernel: audit: type=1300 audit(1707503797.032:608): arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe11987f0 a2=0 a3=ffff950e96c0 items=0 ppid=2117 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.085736 kernel: audit: type=1327 audit(1707503797.032:608): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:36:37.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 18:36:37.041000 audit[2166]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.128240 kernel: audit: type=1325 audit(1707503797.041:609): table=filter:25 family=2 entries=2 op=nft_register_chain pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.128400 kernel: audit: type=1300 audit(1707503797.041:609): arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde2b5720 a2=0 a3=ffffa718b6c0 items=0 ppid=2117 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.041000 audit[2166]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffde2b5720 a2=0 a3=ffffa718b6c0 items=0 ppid=2117 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.041000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:36:37.187220 kernel: audit: type=1327 audit(1707503797.041:609): proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 18:36:37.203067 kernel: audit: type=1325 audit(1707503797.042:610): table=filter:26 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.203190 kernel: audit: type=1300 audit(1707503797.042:610): arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd1d4500 a2=0 a3=ffffb78bc6c0 items=0 ppid=2117 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.042000 audit[2167]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.042000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd1d4500 a2=0 a3=ffffb78bc6c0 items=0 ppid=2117 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.234931 kernel: audit: type=1327 audit(1707503797.042:610): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:36:37.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:36:37.249949 kernel: audit: type=1325 audit(1707503797.044:611): table=filter:27 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.044000 audit[2169]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.044000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff5bcf2f0 a2=0 a3=ffffa489e6c0 items=0 ppid=2117 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.044000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:36:37.045000 audit[2170]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.045000 audit[2170]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8957730 a2=0 a3=ffffa1d606c0 items=0 ppid=2117 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:36:37.047000 audit[2172]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.047000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd17805a0 a2=0 a3=ffffb76616c0 items=0 ppid=2117 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.047000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:36:37.050000 audit[2175]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.050000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeb3525e0 a2=0 a3=ffffabf556c0 items=0 ppid=2117 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 18:36:37.051000 audit[2176]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.051000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff399ccc0 a2=0 a3=ffffae2876c0 items=0 ppid=2117 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:36:37.053000 audit[2178]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.053000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd87dc070 a2=0 a3=ffff9001d6c0 items=0 ppid=2117 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:36:37.054000 audit[2179]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.054000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdee3e770 a2=0 a3=ffffadca56c0 items=0 ppid=2117 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:36:37.056000 audit[2181]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.056000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc31f5920 a2=0 a3=ffff886326c0 items=0 ppid=2117 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.056000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:36:37.060000 audit[2184]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.060000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff3484630 a2=0 a3=ffff889066c0 items=0 ppid=2117 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.060000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:36:37.063000 audit[2187]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.063000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbec3750 a2=0 a3=ffff9d11b6c0 items=0 ppid=2117 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.063000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:36:37.064000 audit[2188]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.064000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe1740d90 a2=0 a3=ffffafdf76c0 items=0 ppid=2117 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:36:37.066000 audit[2190]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.066000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe77a9780 a2=0 a3=ffff9dd5c6c0 items=0 ppid=2117 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.066000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:36:37.273000 audit[2195]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.273000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc41ba600 a2=0 a3=ffffb78686c0 items=0 ppid=2117 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.273000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:36:37.275000 audit[2196]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.275000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4a14a10 a2=0 a3=ffff904186c0 items=0 ppid=2117 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:36:37.277000 audit[2198]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 18:36:37.277000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc9b75e00 a2=0 a3=ffff956ee6c0 items=0 ppid=2117 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:36:37.301000 audit[2204]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:37.301000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffddc61370 a2=0 a3=ffffac7f26c0 items=0 ppid=2117 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:37.395000 audit[2204]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:36:37.395000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffddc61370 a2=0 a3=ffffac7f26c0 items=0 ppid=2117 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:37.423000 audit[2212]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.423000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe0a12920 a2=0 a3=ffff94f396c0 items=0 ppid=2117 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 18:36:37.425000 audit[2214]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.425000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd006c980 a2=0 a3=ffff8e7666c0 items=0 ppid=2117 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 18:36:37.429000 audit[2217]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.429000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffceca98e0 a2=0 a3=ffffb47116c0 items=0 ppid=2117 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 18:36:37.430000 audit[2218]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.430000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0f55a00 a2=0 a3=ffffa14c56c0 items=0 ppid=2117 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 18:36:37.432000 audit[2220]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.432000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed7d9c20 a2=0 a3=ffff8d0a36c0 items=0 ppid=2117 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 18:36:37.433000 audit[2221]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.433000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe34cc0c0 a2=0 a3=ffffa29336c0 items=0 ppid=2117 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 18:36:37.435000 audit[2223]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.435000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff06ce3b0 a2=0 a3=ffff92fcc6c0 items=0 ppid=2117 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 18:36:37.438000 audit[2226]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.438000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc011a120 a2=0 a3=ffffb9ada6c0 items=0 ppid=2117 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 18:36:37.439000 audit[2227]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.439000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2cc6c40 a2=0 a3=ffff84ada6c0 items=0 ppid=2117 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.439000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 18:36:37.441000 audit[2229]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.441000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc5a6ac50 a2=0 a3=ffff836de6c0 items=0 ppid=2117 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 18:36:37.442000 audit[2230]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.442000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3c61270 a2=0 a3=ffff87a066c0 items=0 ppid=2117 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.442000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 18:36:37.444000 audit[2232]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.444000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc7aa32e0 a2=0 a3=ffffaeaae6c0 items=0 ppid=2117 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 18:36:37.447000 audit[2235]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.447000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe91b4060 a2=0 a3=ffff873366c0 items=0 ppid=2117 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.447000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 18:36:37.451000 audit[2238]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.451000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe3bb6b0 a2=0 a3=ffffbd7c26c0 items=0 ppid=2117 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 18:36:37.452000 audit[2239]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.452000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcee241c0 a2=0 a3=ffff8982b6c0 items=0 ppid=2117 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.452000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 18:36:37.454000 audit[2241]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.454000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe7dd27b0 a2=0 a3=ffff89b1d6c0 items=0 ppid=2117 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.454000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:36:37.457000 audit[2244]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.457000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdd90a750 a2=0 a3=ffff821866c0 items=0 ppid=2117 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 18:36:37.458000 audit[2245]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.458000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4e9e100 a2=0 a3=ffffb4fb46c0 items=0 ppid=2117 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.458000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 18:36:37.460000 audit[2247]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.460000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff30856b0 a2=0 a3=ffff84ac86c0 items=0 ppid=2117 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.460000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 18:36:37.461000 audit[2248]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.461000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc54afc90 a2=0 a3=ffff9fdf16c0 items=0 ppid=2117 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 18:36:37.463000 audit[2250]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.463000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe451cd50 a2=0 a3=ffff8156f6c0 items=0 ppid=2117 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.463000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:36:37.466000 audit[2253]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 18:36:37.466000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe2c83e60 a2=0 a3=ffff88fdb6c0 items=0 ppid=2117 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 18:36:37.469000 audit[2255]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:36:37.469000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe61e9b60 a2=0 a3=ffffae4206c0 items=0 ppid=2117 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.469000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:37.470000 audit[2255]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 18:36:37.470000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffe61e9b60 a2=0 a3=ffffae4206c0 items=0 ppid=2117 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:37.470000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:36:37.684859 kubelet[1910]: E0209 18:36:37.684800 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:37.734872 kubelet[1910]: E0209 18:36:37.734528 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:38.361758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3885942427.mount: Deactivated successfully. Feb 9 18:36:38.685318 kubelet[1910]: E0209 18:36:38.685186 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:39.685985 kubelet[1910]: E0209 18:36:39.685933 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:39.735467 kubelet[1910]: E0209 18:36:39.735359 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:40.686887 kubelet[1910]: E0209 18:36:40.686852 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:41.687426 kubelet[1910]: E0209 18:36:41.687387 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:41.734276 kubelet[1910]: E0209 18:36:41.733788 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:42.367916 env[1358]: time="2024-02-09T18:36:42.367863892Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:42.378019 env[1358]: time="2024-02-09T18:36:42.377973282Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:42.386772 env[1358]: time="2024-02-09T18:36:42.386740359Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:42.389711 env[1358]: time="2024-02-09T18:36:42.389682610Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:42.390325 env[1358]: time="2024-02-09T18:36:42.390300530Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 18:36:42.392717 env[1358]: time="2024-02-09T18:36:42.392679417Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 18:36:42.423262 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount52759315.mount: Deactivated successfully. Feb 9 18:36:42.446427 env[1358]: time="2024-02-09T18:36:42.446380765Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8\"" Feb 9 18:36:42.447341 env[1358]: time="2024-02-09T18:36:42.447283707Z" level=info msg="StartContainer for \"cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8\"" Feb 9 18:36:42.469173 systemd[1]: Started cri-containerd-cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8.scope. Feb 9 18:36:42.510233 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 9 18:36:42.510331 kernel: audit: type=1400 audit(1707503802.485:652): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1961 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:42.540442 kernel: audit: type=1300 audit(1707503802.485:652): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1961 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:42.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393131356264623738393062343130346135636337643864393832 Feb 9 18:36:42.568310 kernel: audit: type=1327 audit(1707503802.485:652): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393131356264623738393062343130346135636337643864393832 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.587672 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.607788 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.627684 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.635210 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.668635 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.669043 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.689489 kubelet[1910]: E0209 18:36:42.689114 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:42.689895 env[1358]: time="2024-02-09T18:36:42.689853636Z" level=info msg="StartContainer for \"cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8\" returns successfully" Feb 9 18:36:42.708787 kernel: audit: type=1400 audit(1707503802.485:653): avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.485000 audit: BPF prog-id=79 op=LOAD Feb 9 18:36:42.485000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1961 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:42.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393131356264623738393062343130346135636337643864393832 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.491000 audit: BPF prog-id=80 op=LOAD Feb 9 18:36:42.491000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1961 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:42.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393131356264623738393062343130346135636337643864393832 Feb 9 18:36:42.510000 audit: BPF prog-id=80 op=UNLOAD Feb 9 18:36:42.510000 audit: BPF prog-id=79 op=UNLOAD Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { perfmon } for pid=2264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit[2264]: AVC avc: denied { bpf } for pid=2264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:42.510000 audit: BPF prog-id=81 op=LOAD Feb 9 18:36:42.510000 audit[2264]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1961 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:42.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363393131356264623738393062343130346135636337643864393832 Feb 9 18:36:42.796667 kubelet[1910]: I0209 18:36:42.796606 1910 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sgl47" podStartSLOduration=9.270255909 podCreationTimestamp="2024-02-09 18:36:29 +0000 UTC" firstStartedPulling="2024-02-09 18:36:32.224334219 +0000 UTC m=+5.824034821" lastFinishedPulling="2024-02-09 18:36:36.750634847 +0000 UTC m=+10.350335449" observedRunningTime="2024-02-09 18:36:37.782906986 +0000 UTC m=+11.382607588" watchObservedRunningTime="2024-02-09 18:36:42.796556537 +0000 UTC m=+16.396257139" Feb 9 18:36:43.421353 systemd[1]: run-containerd-runc-k8s.io-cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8-runc.IReNOo.mount: Deactivated successfully. Feb 9 18:36:43.690219 kubelet[1910]: E0209 18:36:43.690114 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:43.733905 kubelet[1910]: E0209 18:36:43.733875 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:44.001369 systemd[1]: cri-containerd-cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8.scope: Deactivated successfully. Feb 9 18:36:44.005000 audit: BPF prog-id=81 op=UNLOAD Feb 9 18:36:44.017996 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8-rootfs.mount: Deactivated successfully. Feb 9 18:36:44.032185 kubelet[1910]: I0209 18:36:44.032026 1910 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 18:36:44.690860 kubelet[1910]: E0209 18:36:44.690822 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:45.691990 kubelet[1910]: E0209 18:36:45.691934 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:45.742753 systemd[1]: Created slice kubepods-besteffort-pod31f785c1_8e39_457a_b7c7_c3ade25ed512.slice. Feb 9 18:36:45.747466 env[1358]: time="2024-02-09T18:36:45.745636144Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kt6ql,Uid:31f785c1-8e39-457a-b7c7-c3ade25ed512,Namespace:calico-system,Attempt:0,}" Feb 9 18:36:45.749187 env[1358]: time="2024-02-09T18:36:45.749134976Z" level=info msg="shim disconnected" id=cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8 Feb 9 18:36:45.749187 env[1358]: time="2024-02-09T18:36:45.749186693Z" level=warning msg="cleaning up after shim disconnected" id=cc9115bdb7890b4104a5cc7d8d982a1f260fec62c85a0b56100c23fe5aa587f8 namespace=k8s.io Feb 9 18:36:45.749292 env[1358]: time="2024-02-09T18:36:45.749196772Z" level=info msg="cleaning up dead shim" Feb 9 18:36:45.755708 env[1358]: time="2024-02-09T18:36:45.755667708Z" level=warning msg="cleanup warnings time=\"2024-02-09T18:36:45Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2307 runtime=io.containerd.runc.v2\n" Feb 9 18:36:45.791028 env[1358]: time="2024-02-09T18:36:45.790932331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 18:36:45.836608 env[1358]: time="2024-02-09T18:36:45.836535859Z" level=error msg="Failed to destroy network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:45.837993 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf-shm.mount: Deactivated successfully. Feb 9 18:36:45.838603 env[1358]: time="2024-02-09T18:36:45.838565578Z" level=error msg="encountered an error cleaning up failed sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:45.838732 env[1358]: time="2024-02-09T18:36:45.838707209Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kt6ql,Uid:31f785c1-8e39-457a-b7c7-c3ade25ed512,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:45.839390 kubelet[1910]: E0209 18:36:45.839024 1910 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:45.839390 kubelet[1910]: E0209 18:36:45.839078 1910 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:45.839390 kubelet[1910]: E0209 18:36:45.839096 1910 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-kt6ql" Feb 9 18:36:45.839532 kubelet[1910]: E0209 18:36:45.839148 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-kt6ql_calico-system(31f785c1-8e39-457a-b7c7-c3ade25ed512)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-kt6ql_calico-system(31f785c1-8e39-457a-b7c7-c3ade25ed512)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:46.692304 kubelet[1910]: E0209 18:36:46.692220 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:46.792198 kubelet[1910]: I0209 18:36:46.791974 1910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:46.792981 env[1358]: time="2024-02-09T18:36:46.792948211Z" level=info msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" Feb 9 18:36:46.814082 env[1358]: time="2024-02-09T18:36:46.814031469Z" level=error msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" failed" error="failed to destroy network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:46.814642 kubelet[1910]: E0209 18:36:46.814462 1910 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:46.814642 kubelet[1910]: E0209 18:36:46.814538 1910 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf"} Feb 9 18:36:46.814642 kubelet[1910]: E0209 18:36:46.814584 1910 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"31f785c1-8e39-457a-b7c7-c3ade25ed512\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:36:46.814642 kubelet[1910]: E0209 18:36:46.814613 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"31f785c1-8e39-457a-b7c7-c3ade25ed512\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-kt6ql" podUID="31f785c1-8e39-457a-b7c7-c3ade25ed512" Feb 9 18:36:47.678340 kubelet[1910]: E0209 18:36:47.678297 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:47.692467 kubelet[1910]: E0209 18:36:47.692434 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:48.692869 kubelet[1910]: E0209 18:36:48.692823 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:49.619956 kubelet[1910]: I0209 18:36:49.619913 1910 topology_manager.go:215] "Topology Admit Handler" podUID="b4cad379-171c-4200-a269-3cef8ee0e1ae" podNamespace="default" podName="nginx-deployment-6d5f899847-69vpv" Feb 9 18:36:49.624482 systemd[1]: Created slice kubepods-besteffort-podb4cad379_171c_4200_a269_3cef8ee0e1ae.slice. Feb 9 18:36:49.692942 kubelet[1910]: E0209 18:36:49.692904 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:49.817335 kubelet[1910]: I0209 18:36:49.817304 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r5dl7\" (UniqueName: \"kubernetes.io/projected/b4cad379-171c-4200-a269-3cef8ee0e1ae-kube-api-access-r5dl7\") pod \"nginx-deployment-6d5f899847-69vpv\" (UID: \"b4cad379-171c-4200-a269-3cef8ee0e1ae\") " pod="default/nginx-deployment-6d5f899847-69vpv" Feb 9 18:36:50.228640 env[1358]: time="2024-02-09T18:36:50.228596327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-69vpv,Uid:b4cad379-171c-4200-a269-3cef8ee0e1ae,Namespace:default,Attempt:0,}" Feb 9 18:36:50.372464 env[1358]: time="2024-02-09T18:36:50.372408231Z" level=error msg="Failed to destroy network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:50.374052 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8-shm.mount: Deactivated successfully. Feb 9 18:36:50.374627 env[1358]: time="2024-02-09T18:36:50.374590996Z" level=error msg="encountered an error cleaning up failed sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:50.374747 env[1358]: time="2024-02-09T18:36:50.374721869Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-69vpv,Uid:b4cad379-171c-4200-a269-3cef8ee0e1ae,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:50.375202 kubelet[1910]: E0209 18:36:50.375039 1910 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:50.375202 kubelet[1910]: E0209 18:36:50.375089 1910 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-69vpv" Feb 9 18:36:50.375202 kubelet[1910]: E0209 18:36:50.375109 1910 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-69vpv" Feb 9 18:36:50.375356 kubelet[1910]: E0209 18:36:50.375179 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-69vpv_default(b4cad379-171c-4200-a269-3cef8ee0e1ae)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-69vpv_default(b4cad379-171c-4200-a269-3cef8ee0e1ae)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-69vpv" podUID="b4cad379-171c-4200-a269-3cef8ee0e1ae" Feb 9 18:36:50.693368 kubelet[1910]: E0209 18:36:50.693272 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:50.799528 kubelet[1910]: I0209 18:36:50.799492 1910 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:36:50.800216 env[1358]: time="2024-02-09T18:36:50.800144415Z" level=info msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" Feb 9 18:36:50.846279 env[1358]: time="2024-02-09T18:36:50.846226640Z" level=error msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" failed" error="failed to destroy network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 18:36:50.846684 kubelet[1910]: E0209 18:36:50.846647 1910 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:36:50.846770 kubelet[1910]: E0209 18:36:50.846698 1910 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8"} Feb 9 18:36:50.846770 kubelet[1910]: E0209 18:36:50.846735 1910 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b4cad379-171c-4200-a269-3cef8ee0e1ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 18:36:50.846770 kubelet[1910]: E0209 18:36:50.846765 1910 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b4cad379-171c-4200-a269-3cef8ee0e1ae\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-69vpv" podUID="b4cad379-171c-4200-a269-3cef8ee0e1ae" Feb 9 18:36:51.023747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3790294396.mount: Deactivated successfully. Feb 9 18:36:51.353667 env[1358]: time="2024-02-09T18:36:51.353537587Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:51.362924 env[1358]: time="2024-02-09T18:36:51.362884709Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:51.366458 env[1358]: time="2024-02-09T18:36:51.366417529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:51.373237 env[1358]: time="2024-02-09T18:36:51.373206941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:51.373709 env[1358]: time="2024-02-09T18:36:51.373681357Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 18:36:51.385495 env[1358]: time="2024-02-09T18:36:51.385461635Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 18:36:51.436065 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3644962541.mount: Deactivated successfully. Feb 9 18:36:51.461452 env[1358]: time="2024-02-09T18:36:51.461386474Z" level=info msg="CreateContainer within sandbox \"bf235205cb088f996a5965ba86900eeb94f7f83a18b27abc2d6a2ca5f6fe035e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2\"" Feb 9 18:36:51.461961 env[1358]: time="2024-02-09T18:36:51.461937325Z" level=info msg="StartContainer for \"2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2\"" Feb 9 18:36:51.478580 systemd[1]: Started cri-containerd-2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2.scope. Feb 9 18:36:51.495000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.502712 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 18:36:51.502793 kernel: audit: type=1400 audit(1707503811.495:659): avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.495000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1961 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:51.557478 kernel: audit: type=1300 audit(1707503811.495:659): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1961 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:51.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366233646435313436316666396562373133316232376536326464 Feb 9 18:36:51.586790 kernel: audit: type=1327 audit(1707503811.495:659): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366233646435313436316666396562373133316232376536326464 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.607561 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.629801 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.652451 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.674513 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.693934 kubelet[1910]: E0209 18:36:51.693883 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:51.695754 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.717448 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.740177 kernel: audit: type=1400 audit(1707503811.496:660): avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.496000 audit: BPF prog-id=82 op=LOAD Feb 9 18:36:51.496000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1961 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:51.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366233646435313436316666396562373133316232376536326464 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.501000 audit: BPF prog-id=83 op=LOAD Feb 9 18:36:51.501000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1961 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:51.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366233646435313436316666396562373133316232376536326464 Feb 9 18:36:51.524000 audit: BPF prog-id=83 op=UNLOAD Feb 9 18:36:51.524000 audit: BPF prog-id=82 op=UNLOAD Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.741883 env[1358]: time="2024-02-09T18:36:51.741836536Z" level=info msg="StartContainer for \"2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2\" returns successfully" Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { perfmon } for pid=2435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit[2435]: AVC avc: denied { bpf } for pid=2435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:51.524000 audit: BPF prog-id=84 op=LOAD Feb 9 18:36:51.524000 audit[2435]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1961 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:51.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262366233646435313436316666396562373133316232376536326464 Feb 9 18:36:51.816766 kubelet[1910]: I0209 18:36:51.816492 1910 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8sdh4" podStartSLOduration=3.666435829 podCreationTimestamp="2024-02-09 18:36:29 +0000 UTC" firstStartedPulling="2024-02-09 18:36:32.224006047 +0000 UTC m=+5.823706649" lastFinishedPulling="2024-02-09 18:36:51.373992541 +0000 UTC m=+24.973693143" observedRunningTime="2024-02-09 18:36:51.816185936 +0000 UTC m=+25.415886538" watchObservedRunningTime="2024-02-09 18:36:51.816422323 +0000 UTC m=+25.416122925" Feb 9 18:36:51.956774 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 18:36:51.956913 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 18:36:52.694780 kubelet[1910]: E0209 18:36:52.694749 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:52.820801 systemd[1]: run-containerd-runc-k8s.io-2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2-runc.YByyzM.mount: Deactivated successfully. Feb 9 18:36:53.221000 audit[2596]: AVC avc: denied { write } for pid=2596 comm="tee" name="fd" dev="proc" ino=17256 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.222000 audit[2599]: AVC avc: denied { write } for pid=2599 comm="tee" name="fd" dev="proc" ino=17259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.223000 audit[2597]: AVC avc: denied { write } for pid=2597 comm="tee" name="fd" dev="proc" ino=18010 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.223000 audit[2597]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcbef1981 a2=241 a3=1b6 items=1 ppid=2553 pid=2597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.223000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 18:36:53.223000 audit: PATH item=0 name="/dev/fd/63" inode=18004 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.223000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.221000 audit[2596]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff2e8982 a2=241 a3=1b6 items=1 ppid=2556 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.221000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 18:36:53.221000 audit: PATH item=0 name="/dev/fd/63" inode=17247 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.221000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.222000 audit[2599]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4ac5981 a2=241 a3=1b6 items=1 ppid=2549 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.222000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 18:36:53.222000 audit: PATH item=0 name="/dev/fd/63" inode=18005 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.222000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.227000 audit[2603]: AVC avc: denied { write } for pid=2603 comm="tee" name="fd" dev="proc" ino=18014 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.227000 audit[2603]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe01d0981 a2=241 a3=1b6 items=1 ppid=2555 pid=2603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.227000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 18:36:53.227000 audit: PATH item=0 name="/dev/fd/63" inode=17252 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.228000 audit[2607]: AVC avc: denied { write } for pid=2607 comm="tee" name="fd" dev="proc" ino=17264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.229000 audit[2606]: AVC avc: denied { write } for pid=2606 comm="tee" name="fd" dev="proc" ino=17267 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.229000 audit[2606]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcb407972 a2=241 a3=1b6 items=1 ppid=2545 pid=2606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.229000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 18:36:53.229000 audit: PATH item=0 name="/dev/fd/63" inode=17253 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.229000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.228000 audit[2607]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc49c8983 a2=241 a3=1b6 items=1 ppid=2546 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.228000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 18:36:53.228000 audit: PATH item=0 name="/dev/fd/63" inode=18007 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.234000 audit[2601]: AVC avc: denied { write } for pid=2601 comm="tee" name="fd" dev="proc" ino=18018 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 18:36:53.234000 audit[2601]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4bb0971 a2=241 a3=1b6 items=1 ppid=2550 pid=2601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.234000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 18:36:53.234000 audit: PATH item=0 name="/dev/fd/63" inode=18006 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:36:53.234000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 18:36:53.457192 kernel: Initializing XFRM netlink socket Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit: BPF prog-id=85 op=LOAD Feb 9 18:36:53.574000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3b824e8 a2=70 a3=0 items=0 ppid=2551 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.574000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:36:53.574000 audit: BPF prog-id=85 op=UNLOAD Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit: BPF prog-id=86 op=LOAD Feb 9 18:36:53.574000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3b824e8 a2=70 a3=4a174c items=0 ppid=2551 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.574000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:36:53.574000 audit: BPF prog-id=86 op=UNLOAD Feb 9 18:36:53.574000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.574000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe3b82518 a2=70 a3=3411379f items=0 ppid=2551 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.574000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { perfmon } for pid=2686 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit[2686]: AVC avc: denied { bpf } for pid=2686 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.575000 audit: BPF prog-id=87 op=LOAD Feb 9 18:36:53.575000 audit[2686]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe3b82468 a2=70 a3=341137b9 items=0 ppid=2551 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.575000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 18:36:53.580000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.580000 audit[2690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc15319e8 a2=70 a3=0 items=0 ppid=2551 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.580000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:36:53.581000 audit[2690]: AVC avc: denied { bpf } for pid=2690 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:53.581000 audit[2690]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc15318c8 a2=70 a3=2 items=0 ppid=2551 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.581000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 18:36:53.587000 audit: BPF prog-id=87 op=UNLOAD Feb 9 18:36:53.683000 audit[2711]: NETFILTER_CFG table=mangle:68 family=2 entries=19 op=nft_register_chain pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:53.683000 audit[2711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffdc889620 a2=0 a3=ffffa9da2fa8 items=0 ppid=2551 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.683000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:53.689000 audit[2715]: NETFILTER_CFG table=nat:69 family=2 entries=16 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:53.689000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffff3c6340 a2=0 a3=ffffbd232fa8 items=0 ppid=2551 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.689000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:53.690000 audit[2713]: NETFILTER_CFG table=filter:70 family=2 entries=39 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:53.690000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd8aabe00 a2=0 a3=ffff98600fa8 items=0 ppid=2551 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.690000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:53.695776 kubelet[1910]: E0209 18:36:53.695735 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:53.697000 audit[2712]: NETFILTER_CFG table=raw:71 family=2 entries=19 op=nft_register_chain pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:53.697000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc7494850 a2=0 a3=ffff82678fa8 items=0 ppid=2551 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:53.697000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:54.497860 systemd-networkd[1503]: vxlan.calico: Link UP Feb 9 18:36:54.497872 systemd-networkd[1503]: vxlan.calico: Gained carrier Feb 9 18:36:54.696705 kubelet[1910]: E0209 18:36:54.696632 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:55.566305 systemd-networkd[1503]: vxlan.calico: Gained IPv6LL Feb 9 18:36:55.697262 kubelet[1910]: E0209 18:36:55.697226 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:56.697779 kubelet[1910]: E0209 18:36:56.697745 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:57.699047 kubelet[1910]: E0209 18:36:57.699021 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:57.734896 env[1358]: time="2024-02-09T18:36:57.734859135Z" level=info msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.780 [INFO][2742] k8s.go 578: Cleaning up netns ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.781 [INFO][2742] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" iface="eth0" netns="/var/run/netns/cni-f97e24a0-af37-1c8e-c8f8-fb589f78acce" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.781 [INFO][2742] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" iface="eth0" netns="/var/run/netns/cni-f97e24a0-af37-1c8e-c8f8-fb589f78acce" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.781 [INFO][2742] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" iface="eth0" netns="/var/run/netns/cni-f97e24a0-af37-1c8e-c8f8-fb589f78acce" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.781 [INFO][2742] k8s.go 585: Releasing IP address(es) ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.781 [INFO][2742] utils.go 188: Calico CNI releasing IP address ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.797 [INFO][2748] ipam_plugin.go 415: Releasing address using handleID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.797 [INFO][2748] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.797 [INFO][2748] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.807 [WARNING][2748] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.807 [INFO][2748] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.809 [INFO][2748] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:36:57.811514 env[1358]: 2024-02-09 18:36:57.810 [INFO][2742] k8s.go 591: Teardown processing complete. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:36:57.813359 systemd[1]: run-netns-cni\x2df97e24a0\x2daf37\x2d1c8e\x2dc8f8\x2dfb589f78acce.mount: Deactivated successfully. Feb 9 18:36:57.814323 env[1358]: time="2024-02-09T18:36:57.814289982Z" level=info msg="TearDown network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" successfully" Feb 9 18:36:57.814415 env[1358]: time="2024-02-09T18:36:57.814398057Z" level=info msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" returns successfully" Feb 9 18:36:57.815255 env[1358]: time="2024-02-09T18:36:57.815218861Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kt6ql,Uid:31f785c1-8e39-457a-b7c7-c3ade25ed512,Namespace:calico-system,Attempt:1,}" Feb 9 18:36:57.973637 systemd-networkd[1503]: calia7bb24ba35b: Link UP Feb 9 18:36:57.989366 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:36:57.989544 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia7bb24ba35b: link becomes ready Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.901 [INFO][2755] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-csi--node--driver--kt6ql-eth0 csi-node-driver- calico-system 31f785c1-8e39-457a-b7c7-c3ade25ed512 1214 0 2024-02-09 18:36:29 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 csi-node-driver-kt6ql eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia7bb24ba35b [] []}} ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.901 [INFO][2755] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.927 [INFO][2765] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" HandleID="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.940 [INFO][2765] ipam_plugin.go 268: Auto assigning IP ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" HandleID="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b9c0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.44", "pod":"csi-node-driver-kt6ql", "timestamp":"2024-02-09 18:36:57.927306584 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.940 [INFO][2765] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.940 [INFO][2765] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.940 [INFO][2765] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.941 [INFO][2765] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.944 [INFO][2765] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.948 [INFO][2765] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.949 [INFO][2765] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.955 [INFO][2765] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.955 [INFO][2765] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.957 [INFO][2765] ipam.go 1682: Creating new handle: k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190 Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.960 [INFO][2765] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.967 [INFO][2765] ipam.go 1216: Successfully claimed IPs: [192.168.8.129/26] block=192.168.8.128/26 handle="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.967 [INFO][2765] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.129/26] handle="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" host="10.200.20.44" Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.967 [INFO][2765] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:36:57.991488 env[1358]: 2024-02-09 18:36:57.967 [INFO][2765] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.129/26] IPv6=[] ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" HandleID="k8s-pod-network.6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.969 [INFO][2755] k8s.go 385: Populated endpoint ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--kt6ql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31f785c1-8e39-457a-b7c7-c3ade25ed512", ResourceVersion:"1214", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"csi-node-driver-kt6ql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia7bb24ba35b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.969 [INFO][2755] k8s.go 386: Calico CNI using IPs: [192.168.8.129/32] ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.969 [INFO][2755] dataplane_linux.go 68: Setting the host side veth name to calia7bb24ba35b ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.974 [INFO][2755] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.974 [INFO][2755] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--kt6ql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31f785c1-8e39-457a-b7c7-c3ade25ed512", ResourceVersion:"1214", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190", Pod:"csi-node-driver-kt6ql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia7bb24ba35b", MAC:"06:9f:4d:19:38:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:36:57.992248 env[1358]: 2024-02-09 18:36:57.987 [INFO][2755] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190" Namespace="calico-system" Pod="csi-node-driver-kt6ql" WorkloadEndpoint="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:36:57.997421 systemd-networkd[1503]: calia7bb24ba35b: Gained carrier Feb 9 18:36:58.011000 audit[2787]: NETFILTER_CFG table=filter:72 family=2 entries=36 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:58.018365 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 18:36:58.018449 kernel: audit: type=1325 audit(1707503818.011:685): table=filter:72 family=2 entries=36 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:36:58.011000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdeb15410 a2=0 a3=ffffa2f30fa8 items=0 ppid=2551 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.066143 kernel: audit: type=1300 audit(1707503818.011:685): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdeb15410 a2=0 a3=ffffa2f30fa8 items=0 ppid=2551 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.066297 kernel: audit: type=1327 audit(1707503818.011:685): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:58.011000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:36:58.073979 env[1358]: time="2024-02-09T18:36:58.073895536Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:36:58.074215 env[1358]: time="2024-02-09T18:36:58.074187763Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:36:58.074320 env[1358]: time="2024-02-09T18:36:58.074298919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:36:58.075748 env[1358]: time="2024-02-09T18:36:58.075713298Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190 pid=2796 runtime=io.containerd.runc.v2 Feb 9 18:36:58.099653 systemd[1]: Started cri-containerd-6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190.scope. Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.153269 kernel: audit: type=1400 audit(1707503818.111:686): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.153381 kernel: audit: type=1400 audit(1707503818.111:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.173533 kernel: audit: type=1400 audit(1707503818.111:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.193685 kernel: audit: type=1400 audit(1707503818.111:689): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.234073 kernel: audit: type=1400 audit(1707503818.111:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.234257 kernel: audit: type=1400 audit(1707503818.111:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.234327 env[1358]: time="2024-02-09T18:36:58.223024214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-kt6ql,Uid:31f785c1-8e39-457a-b7c7-c3ade25ed512,Namespace:calico-system,Attempt:1,} returns sandbox id \"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190\"" Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.256247 kernel: audit: type=1400 audit(1707503818.111:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.111000 audit: BPF prog-id=88 op=LOAD Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2796 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066383130633563643435393266666164633032656539303434 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2796 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066383130633563643435393266666164633032656539303434 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.117000 audit: BPF prog-id=89 op=LOAD Feb 9 18:36:58.117000 audit[2806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2796 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066383130633563643435393266666164633032656539303434 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.132000 audit: BPF prog-id=90 op=LOAD Feb 9 18:36:58.132000 audit[2806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2796 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066383130633563643435393266666164633032656539303434 Feb 9 18:36:58.152000 audit: BPF prog-id=90 op=UNLOAD Feb 9 18:36:58.152000 audit: BPF prog-id=89 op=UNLOAD Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { perfmon } for pid=2806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit[2806]: AVC avc: denied { bpf } for pid=2806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:58.152000 audit: BPF prog-id=91 op=LOAD Feb 9 18:36:58.152000 audit[2806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2796 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:58.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662353066383130633563643435393266666164633032656539303434 Feb 9 18:36:58.258641 env[1358]: time="2024-02-09T18:36:58.258608717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 18:36:58.700329 kubelet[1910]: E0209 18:36:58.700220 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:58.813575 systemd[1]: run-containerd-runc-k8s.io-6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190-runc.3i7uGm.mount: Deactivated successfully. Feb 9 18:36:59.086318 systemd-networkd[1503]: calia7bb24ba35b: Gained IPv6LL Feb 9 18:36:59.700636 kubelet[1910]: E0209 18:36:59.700597 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:36:59.716963 env[1358]: time="2024-02-09T18:36:59.716918754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:59.727683 env[1358]: time="2024-02-09T18:36:59.727645901Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:59.736299 env[1358]: time="2024-02-09T18:36:59.736277297Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:59.740941 env[1358]: time="2024-02-09T18:36:59.740902502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:36:59.741375 env[1358]: time="2024-02-09T18:36:59.741347243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 18:36:59.742983 env[1358]: time="2024-02-09T18:36:59.742957535Z" level=info msg="CreateContainer within sandbox \"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 18:36:59.783394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3796060043.mount: Deactivated successfully. Feb 9 18:36:59.805999 env[1358]: time="2024-02-09T18:36:59.805957836Z" level=info msg="CreateContainer within sandbox \"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1bce5055bd6fcdba5471b95859b53cf023cb4011b8ce94d588f746f19f743fdf\"" Feb 9 18:36:59.806702 env[1358]: time="2024-02-09T18:36:59.806634648Z" level=info msg="StartContainer for \"1bce5055bd6fcdba5471b95859b53cf023cb4011b8ce94d588f746f19f743fdf\"" Feb 9 18:36:59.833821 systemd[1]: run-containerd-runc-k8s.io-1bce5055bd6fcdba5471b95859b53cf023cb4011b8ce94d588f746f19f743fdf-runc.Djmx6A.mount: Deactivated successfully. Feb 9 18:36:59.837667 systemd[1]: Started cri-containerd-1bce5055bd6fcdba5471b95859b53cf023cb4011b8ce94d588f746f19f743fdf.scope. Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2796 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:59.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636535303535626436666364626135343731623935383539623533 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit: BPF prog-id=92 op=LOAD Feb 9 18:36:59.850000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2796 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:59.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636535303535626436666364626135343731623935383539623533 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit: BPF prog-id=93 op=LOAD Feb 9 18:36:59.850000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2796 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:59.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636535303535626436666364626135343731623935383539623533 Feb 9 18:36:59.850000 audit: BPF prog-id=93 op=UNLOAD Feb 9 18:36:59.850000 audit: BPF prog-id=92 op=UNLOAD Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { perfmon } for pid=2844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit[2844]: AVC avc: denied { bpf } for pid=2844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:36:59.850000 audit: BPF prog-id=94 op=LOAD Feb 9 18:36:59.850000 audit[2844]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2796 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:36:59.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636535303535626436666364626135343731623935383539623533 Feb 9 18:36:59.870061 env[1358]: time="2024-02-09T18:36:59.870016253Z" level=info msg="StartContainer for \"1bce5055bd6fcdba5471b95859b53cf023cb4011b8ce94d588f746f19f743fdf\" returns successfully" Feb 9 18:36:59.871670 env[1358]: time="2024-02-09T18:36:59.871631945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 18:37:00.701009 kubelet[1910]: E0209 18:37:00.700957 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:01.483399 env[1358]: time="2024-02-09T18:37:01.483351807Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:01.494874 env[1358]: time="2024-02-09T18:37:01.494840824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:01.508860 env[1358]: time="2024-02-09T18:37:01.508829820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:01.517251 env[1358]: time="2024-02-09T18:37:01.517223122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:01.517583 env[1358]: time="2024-02-09T18:37:01.517552189Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 18:37:01.519494 env[1358]: time="2024-02-09T18:37:01.519463032Z" level=info msg="CreateContainer within sandbox \"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 18:37:01.554667 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2037778206.mount: Deactivated successfully. Feb 9 18:37:01.579454 env[1358]: time="2024-02-09T18:37:01.579396096Z" level=info msg="CreateContainer within sandbox \"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"934fd703a2e4b2aa2fead990bab6a703cefd6a3a0c6a9cdafd2f152e0b7c2f2c\"" Feb 9 18:37:01.580222 env[1358]: time="2024-02-09T18:37:01.580148986Z" level=info msg="StartContainer for \"934fd703a2e4b2aa2fead990bab6a703cefd6a3a0c6a9cdafd2f152e0b7c2f2c\"" Feb 9 18:37:01.599719 systemd[1]: run-containerd-runc-k8s.io-934fd703a2e4b2aa2fead990bab6a703cefd6a3a0c6a9cdafd2f152e0b7c2f2c-runc.aey2pq.mount: Deactivated successfully. Feb 9 18:37:01.600904 systemd[1]: Started cri-containerd-934fd703a2e4b2aa2fead990bab6a703cefd6a3a0c6a9cdafd2f152e0b7c2f2c.scope. Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2796 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346664373033613265346232616132666561643939306261623661 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit: BPF prog-id=95 op=LOAD Feb 9 18:37:01.617000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2796 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346664373033613265346232616132666561643939306261623661 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.617000 audit: BPF prog-id=96 op=LOAD Feb 9 18:37:01.617000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2796 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.617000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346664373033613265346232616132666561643939306261623661 Feb 9 18:37:01.618000 audit: BPF prog-id=96 op=UNLOAD Feb 9 18:37:01.618000 audit: BPF prog-id=95 op=UNLOAD Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { perfmon } for pid=2879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit[2879]: AVC avc: denied { bpf } for pid=2879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:01.618000 audit: BPF prog-id=97 op=LOAD Feb 9 18:37:01.618000 audit[2879]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2796 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:01.618000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933346664373033613265346232616132666561643939306261623661 Feb 9 18:37:01.643988 env[1358]: time="2024-02-09T18:37:01.643946255Z" level=info msg="StartContainer for \"934fd703a2e4b2aa2fead990bab6a703cefd6a3a0c6a9cdafd2f152e0b7c2f2c\" returns successfully" Feb 9 18:37:01.701708 kubelet[1910]: E0209 18:37:01.701661 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:01.771370 kubelet[1910]: I0209 18:37:01.769868 1910 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 18:37:01.771370 kubelet[1910]: I0209 18:37:01.769919 1910 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 18:37:02.702606 kubelet[1910]: E0209 18:37:02.702569 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:03.703723 kubelet[1910]: E0209 18:37:03.703675 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:03.738864 env[1358]: time="2024-02-09T18:37:03.738808288Z" level=info msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" Feb 9 18:37:03.778650 kubelet[1910]: I0209 18:37:03.778458 1910 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-kt6ql" podStartSLOduration=31.517073554 podCreationTimestamp="2024-02-09 18:36:29 +0000 UTC" firstStartedPulling="2024-02-09 18:36:58.256419892 +0000 UTC m=+31.856120454" lastFinishedPulling="2024-02-09 18:37:01.5177655 +0000 UTC m=+35.117466102" observedRunningTime="2024-02-09 18:37:01.838053112 +0000 UTC m=+35.437753714" watchObservedRunningTime="2024-02-09 18:37:03.778419202 +0000 UTC m=+37.378119764" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.777 [INFO][2930] k8s.go 578: Cleaning up netns ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.778 [INFO][2930] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" iface="eth0" netns="/var/run/netns/cni-deaa524d-395c-44f5-4442-ebd32be67926" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.779 [INFO][2930] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" iface="eth0" netns="/var/run/netns/cni-deaa524d-395c-44f5-4442-ebd32be67926" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.779 [INFO][2930] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" iface="eth0" netns="/var/run/netns/cni-deaa524d-395c-44f5-4442-ebd32be67926" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.779 [INFO][2930] k8s.go 585: Releasing IP address(es) ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.779 [INFO][2930] utils.go 188: Calico CNI releasing IP address ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.794 [INFO][2936] ipam_plugin.go 415: Releasing address using handleID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.794 [INFO][2936] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.794 [INFO][2936] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.804 [WARNING][2936] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.804 [INFO][2936] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.805 [INFO][2936] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:03.807871 env[1358]: 2024-02-09 18:37:03.806 [INFO][2930] k8s.go 591: Teardown processing complete. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:03.809333 systemd[1]: run-netns-cni\x2ddeaa524d\x2d395c\x2d44f5\x2d4442\x2debd32be67926.mount: Deactivated successfully. Feb 9 18:37:03.811394 env[1358]: time="2024-02-09T18:37:03.810304253Z" level=info msg="TearDown network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" successfully" Feb 9 18:37:03.811394 env[1358]: time="2024-02-09T18:37:03.810354292Z" level=info msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" returns successfully" Feb 9 18:37:03.811394 env[1358]: time="2024-02-09T18:37:03.811358493Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-69vpv,Uid:b4cad379-171c-4200-a269-3cef8ee0e1ae,Namespace:default,Attempt:1,}" Feb 9 18:37:03.974243 systemd-networkd[1503]: cali0db02827097: Link UP Feb 9 18:37:03.988417 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:37:03.988948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0db02827097: link becomes ready Feb 9 18:37:03.988740 systemd-networkd[1503]: cali0db02827097: Gained carrier Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.907 [INFO][2942] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0 nginx-deployment-6d5f899847- default b4cad379-171c-4200-a269-3cef8ee0e1ae 1245 0 2024-02-09 18:36:49 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 nginx-deployment-6d5f899847-69vpv eth0 default [] [] [kns.default ksa.default.default] cali0db02827097 [] []}} ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.907 [INFO][2942] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.928 [INFO][2954] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" HandleID="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.941 [INFO][2954] ipam_plugin.go 268: Auto assigning IP ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" HandleID="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"nginx-deployment-6d5f899847-69vpv", "timestamp":"2024-02-09 18:37:03.928817048 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.941 [INFO][2954] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.941 [INFO][2954] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.941 [INFO][2954] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.943 [INFO][2954] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.946 [INFO][2954] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.950 [INFO][2954] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.951 [INFO][2954] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.953 [INFO][2954] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.953 [INFO][2954] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.955 [INFO][2954] ipam.go 1682: Creating new handle: k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4 Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.959 [INFO][2954] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.966 [INFO][2954] ipam.go 1216: Successfully claimed IPs: [192.168.8.130/26] block=192.168.8.128/26 handle="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.967 [INFO][2954] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.130/26] handle="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" host="10.200.20.44" Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.967 [INFO][2954] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:04.005277 env[1358]: 2024-02-09 18:37:03.967 [INFO][2954] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.130/26] IPv6=[] ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" HandleID="k8s-pod-network.6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:03.968 [INFO][2942] k8s.go 385: Populated endpoint ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b4cad379-171c-4200-a269-3cef8ee0e1ae", ResourceVersion:"1245", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"nginx-deployment-6d5f899847-69vpv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0db02827097", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:03.968 [INFO][2942] k8s.go 386: Calico CNI using IPs: [192.168.8.130/32] ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:03.968 [INFO][2942] dataplane_linux.go 68: Setting the host side veth name to cali0db02827097 ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:03.990 [INFO][2942] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:03.990 [INFO][2942] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b4cad379-171c-4200-a269-3cef8ee0e1ae", ResourceVersion:"1245", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4", Pod:"nginx-deployment-6d5f899847-69vpv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0db02827097", MAC:"46:50:e7:66:7c:9f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:04.005810 env[1358]: 2024-02-09 18:37:04.000 [INFO][2942] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4" Namespace="default" Pod="nginx-deployment-6d5f899847-69vpv" WorkloadEndpoint="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:04.011000 audit[2973]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:37:04.018041 kernel: kauditd_printk_skb: 136 callbacks suppressed Feb 9 18:37:04.018138 kernel: audit: type=1325 audit(1707503824.011:716): table=filter:73 family=2 entries=40 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:37:04.011000 audit[2973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=fffffc38b340 a2=0 a3=ffffb6401fa8 items=0 ppid=2551 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.068192 kernel: audit: type=1300 audit(1707503824.011:716): arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=fffffc38b340 a2=0 a3=ffffb6401fa8 items=0 ppid=2551 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.068303 kernel: audit: type=1327 audit(1707503824.011:716): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:37:04.011000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:37:04.087637 env[1358]: time="2024-02-09T18:37:04.075375067Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:37:04.087637 env[1358]: time="2024-02-09T18:37:04.075411425Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:37:04.087637 env[1358]: time="2024-02-09T18:37:04.075433824Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:37:04.087637 env[1358]: time="2024-02-09T18:37:04.075554340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4 pid=2987 runtime=io.containerd.runc.v2 Feb 9 18:37:04.105975 systemd[1]: Started cri-containerd-6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4.scope. Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155350 kernel: audit: type=1400 audit(1707503824.114:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155441 kernel: audit: type=1400 audit(1707503824.114:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.176260 kernel: audit: type=1400 audit(1707503824.114:719): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.195562 kernel: audit: type=1400 audit(1707503824.114:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.214731 kernel: audit: type=1400 audit(1707503824.114:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.234878 kernel: audit: type=1400 audit(1707503824.114:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.134000 audit: BPF prog-id=98 op=LOAD Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383438303432356665313862646238393964303831333235343537 Feb 9 18:37:04.256188 kernel: audit: type=1400 audit(1707503824.114:723): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383438303432356665313862646238393964303831333235343537 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit: BPF prog-id=99 op=LOAD Feb 9 18:37:04.155000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383438303432356665313862646238393964303831333235343537 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit: BPF prog-id=100 op=LOAD Feb 9 18:37:04.155000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383438303432356665313862646238393964303831333235343537 Feb 9 18:37:04.155000 audit: BPF prog-id=100 op=UNLOAD Feb 9 18:37:04.155000 audit: BPF prog-id=99 op=UNLOAD Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { perfmon } for pid=2997 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit[2997]: AVC avc: denied { bpf } for pid=2997 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:04.155000 audit: BPF prog-id=101 op=LOAD Feb 9 18:37:04.155000 audit[2997]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2987 pid=2997 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:04.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383438303432356665313862646238393964303831333235343537 Feb 9 18:37:04.268155 env[1358]: time="2024-02-09T18:37:04.268116726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-69vpv,Uid:b4cad379-171c-4200-a269-3cef8ee0e1ae,Namespace:default,Attempt:1,} returns sandbox id \"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4\"" Feb 9 18:37:04.270149 env[1358]: time="2024-02-09T18:37:04.270122730Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:37:04.704887 kubelet[1910]: E0209 18:37:04.704782 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:04.809421 systemd[1]: run-containerd-runc-k8s.io-6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4-runc.ENwRUp.mount: Deactivated successfully. Feb 9 18:37:05.705278 kubelet[1910]: E0209 18:37:05.705229 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:05.806586 systemd-networkd[1503]: cali0db02827097: Gained IPv6LL Feb 9 18:37:06.705423 kubelet[1910]: E0209 18:37:06.705361 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:06.842509 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1461933625.mount: Deactivated successfully. Feb 9 18:37:07.677610 kubelet[1910]: E0209 18:37:07.677562 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:07.705827 kubelet[1910]: E0209 18:37:07.705774 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:07.741506 env[1358]: time="2024-02-09T18:37:07.741458129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:07.750655 env[1358]: time="2024-02-09T18:37:07.750627165Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:07.755929 env[1358]: time="2024-02-09T18:37:07.755904819Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:07.763359 env[1358]: time="2024-02-09T18:37:07.763319677Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:07.763959 env[1358]: time="2024-02-09T18:37:07.763934616Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 18:37:07.766442 env[1358]: time="2024-02-09T18:37:07.766417048Z" level=info msg="CreateContainer within sandbox \"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 18:37:07.800083 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount64881678.mount: Deactivated successfully. Feb 9 18:37:07.804991 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3353625176.mount: Deactivated successfully. Feb 9 18:37:07.818665 env[1358]: time="2024-02-09T18:37:07.818622246Z" level=info msg="CreateContainer within sandbox \"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ea1dfae40242e2c741a216f8d763e436e06394bf9d23988cea738ee4f8a1759b\"" Feb 9 18:37:07.819538 env[1358]: time="2024-02-09T18:37:07.819502695Z" level=info msg="StartContainer for \"ea1dfae40242e2c741a216f8d763e436e06394bf9d23988cea738ee4f8a1759b\"" Feb 9 18:37:07.837252 systemd[1]: Started cri-containerd-ea1dfae40242e2c741a216f8d763e436e06394bf9d23988cea738ee4f8a1759b.scope. Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit: BPF prog-id=102 op=LOAD Feb 9 18:37:07.851000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.851000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2987 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561316466616534303234326532633734316132313666386437363365 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2987 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561316466616534303234326532633734316132313666386437363365 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit: BPF prog-id=103 op=LOAD Feb 9 18:37:07.852000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2987 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561316466616534303234326532633734316132313666386437363365 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit: BPF prog-id=104 op=LOAD Feb 9 18:37:07.852000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2987 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561316466616534303234326532633734316132313666386437363365 Feb 9 18:37:07.852000 audit: BPF prog-id=104 op=UNLOAD Feb 9 18:37:07.852000 audit: BPF prog-id=103 op=UNLOAD Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { perfmon } for pid=3032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit[3032]: AVC avc: denied { bpf } for pid=3032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:07.852000 audit: BPF prog-id=105 op=LOAD Feb 9 18:37:07.852000 audit[3032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2987 pid=3032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:07.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561316466616534303234326532633734316132313666386437363365 Feb 9 18:37:07.869288 env[1358]: time="2024-02-09T18:37:07.869241020Z" level=info msg="StartContainer for \"ea1dfae40242e2c741a216f8d763e436e06394bf9d23988cea738ee4f8a1759b\" returns successfully" Feb 9 18:37:08.706341 kubelet[1910]: E0209 18:37:08.706307 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:09.706837 kubelet[1910]: E0209 18:37:09.706808 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:10.707928 kubelet[1910]: E0209 18:37:10.707890 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:11.708042 kubelet[1910]: E0209 18:37:11.708012 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:12.709418 kubelet[1910]: E0209 18:37:12.709383 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:13.710850 kubelet[1910]: E0209 18:37:13.710808 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:14.711195 kubelet[1910]: E0209 18:37:14.711143 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:15.712091 kubelet[1910]: E0209 18:37:15.712059 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:16.569574 systemd[1]: run-containerd-runc-k8s.io-2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2-runc.P2e56r.mount: Deactivated successfully. Feb 9 18:37:16.641713 kubelet[1910]: I0209 18:37:16.641679 1910 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-69vpv" podStartSLOduration=24.14698128 podCreationTimestamp="2024-02-09 18:36:49 +0000 UTC" firstStartedPulling="2024-02-09 18:37:04.269526393 +0000 UTC m=+37.869226995" lastFinishedPulling="2024-02-09 18:37:07.764187167 +0000 UTC m=+41.363887769" observedRunningTime="2024-02-09 18:37:08.858885144 +0000 UTC m=+42.458585746" watchObservedRunningTime="2024-02-09 18:37:16.641642054 +0000 UTC m=+50.241342656" Feb 9 18:37:16.650000 audit[3114]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.657892 kernel: kauditd_printk_skb: 107 callbacks suppressed Feb 9 18:37:16.657954 kernel: audit: type=1325 audit(1707503836.650:753): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.650000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffca625450 a2=0 a3=ffffa48736c0 items=0 ppid=2117 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.706236 kernel: audit: type=1300 audit(1707503836.650:753): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffca625450 a2=0 a3=ffffa48736c0 items=0 ppid=2117 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.706868 kubelet[1910]: I0209 18:37:16.706835 1910 topology_manager.go:215] "Topology Admit Handler" podUID="27c7fa68-00c1-41a8-9984-56aa84632558" podNamespace="default" podName="nfs-server-provisioner-0" Feb 9 18:37:16.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.712223 kubelet[1910]: E0209 18:37:16.712204 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:16.722934 kernel: audit: type=1327 audit(1707503836.650:753): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.722000 audit[3114]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.739632 kernel: audit: type=1325 audit(1707503836.722:754): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.722000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffca625450 a2=0 a3=ffffa48736c0 items=0 ppid=2117 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.770767 kernel: audit: type=1300 audit(1707503836.722:754): arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffca625450 a2=0 a3=ffffa48736c0 items=0 ppid=2117 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.775250 systemd[1]: Created slice kubepods-besteffort-pod27c7fa68_00c1_41a8_9984_56aa84632558.slice. Feb 9 18:37:16.775720 kubelet[1910]: I0209 18:37:16.775703 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pbz2p\" (UniqueName: \"kubernetes.io/projected/27c7fa68-00c1-41a8-9984-56aa84632558-kube-api-access-pbz2p\") pod \"nfs-server-provisioner-0\" (UID: \"27c7fa68-00c1-41a8-9984-56aa84632558\") " pod="default/nfs-server-provisioner-0" Feb 9 18:37:16.775836 kubelet[1910]: I0209 18:37:16.775826 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/27c7fa68-00c1-41a8-9984-56aa84632558-data\") pod \"nfs-server-provisioner-0\" (UID: \"27c7fa68-00c1-41a8-9984-56aa84632558\") " pod="default/nfs-server-provisioner-0" Feb 9 18:37:16.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.791930 kernel: audit: type=1327 audit(1707503836.722:754): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.785000 audit[3119]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.808185 kernel: audit: type=1325 audit(1707503836.785:755): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.785000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffa6d21c0 a2=0 a3=ffffb84816c0 items=0 ppid=2117 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.839721 kernel: audit: type=1300 audit(1707503836.785:755): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffa6d21c0 a2=0 a3=ffffb84816c0 items=0 ppid=2117 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.855630 kernel: audit: type=1327 audit(1707503836.785:755): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:16.855743 kernel: audit: type=1325 audit(1707503836.785:756): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.785000 audit[3119]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3119 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:16.785000 audit[3119]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffffa6d21c0 a2=0 a3=ffffb84816c0 items=0 ppid=2117 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:16.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:17.142275 env[1358]: time="2024-02-09T18:37:17.141487430Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:27c7fa68-00c1-41a8-9984-56aa84632558,Namespace:default,Attempt:0,}" Feb 9 18:37:17.295195 systemd-networkd[1503]: cali60e51b789ff: Link UP Feb 9 18:37:17.309950 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:37:17.310222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 18:37:17.310320 systemd-networkd[1503]: cali60e51b789ff: Gained carrier Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.228 [INFO][3121] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 27c7fa68-00c1-41a8-9984-56aa84632558 1298 0 2024-02-09 18:37:16 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.44 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.228 [INFO][3121] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.251 [INFO][3134] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" HandleID="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.264 [INFO][3134] ipam_plugin.go 268: Auto assigning IP ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" HandleID="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b27c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 18:37:17.251902854 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.264 [INFO][3134] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.264 [INFO][3134] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.264 [INFO][3134] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.266 [INFO][3134] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.269 [INFO][3134] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.272 [INFO][3134] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.274 [INFO][3134] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.276 [INFO][3134] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.276 [INFO][3134] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.277 [INFO][3134] ipam.go 1682: Creating new handle: k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850 Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.280 [INFO][3134] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.284 [INFO][3134] ipam.go 1216: Successfully claimed IPs: [192.168.8.131/26] block=192.168.8.128/26 handle="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.284 [INFO][3134] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.131/26] handle="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" host="10.200.20.44" Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.284 [INFO][3134] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:17.319208 env[1358]: 2024-02-09 18:37:17.284 [INFO][3134] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.131/26] IPv6=[] ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" HandleID="k8s-pod-network.fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Workload="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.319833 env[1358]: 2024-02-09 18:37:17.286 [INFO][3121] k8s.go 385: Populated endpoint ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"27c7fa68-00c1-41a8-9984-56aa84632558", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:17.319833 env[1358]: 2024-02-09 18:37:17.286 [INFO][3121] k8s.go 386: Calico CNI using IPs: [192.168.8.131/32] ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.319833 env[1358]: 2024-02-09 18:37:17.286 [INFO][3121] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.319833 env[1358]: 2024-02-09 18:37:17.310 [INFO][3121] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.320004 env[1358]: 2024-02-09 18:37:17.311 [INFO][3121] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"27c7fa68-00c1-41a8-9984-56aa84632558", ResourceVersion:"1298", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 37, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.8.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"02:2c:15:0e:73:cd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:17.320004 env[1358]: 2024-02-09 18:37:17.316 [INFO][3121] k8s.go 491: Wrote updated endpoint to datastore ContainerID="fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.44-k8s-nfs--server--provisioner--0-eth0" Feb 9 18:37:17.335000 audit[3156]: NETFILTER_CFG table=filter:78 family=2 entries=38 op=nft_register_chain pid=3156 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:37:17.335000 audit[3156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffd00ef690 a2=0 a3=ffffb08aafa8 items=0 ppid=2551 pid=3156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.335000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:37:17.338718 env[1358]: time="2024-02-09T18:37:17.338659158Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:37:17.338834 env[1358]: time="2024-02-09T18:37:17.338697517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:37:17.338834 env[1358]: time="2024-02-09T18:37:17.338708876Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:37:17.338926 env[1358]: time="2024-02-09T18:37:17.338866752Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850 pid=3164 runtime=io.containerd.runc.v2 Feb 9 18:37:17.349485 systemd[1]: Started cri-containerd-fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850.scope. Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.361000 audit: BPF prog-id=106 op=LOAD Feb 9 18:37:17.362000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.362000 audit[3175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3164 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366135333233326565363034313562363632353161643564323135 Feb 9 18:37:17.362000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.362000 audit[3175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3164 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366135333233326565363034313562363632353161643564323135 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit: BPF prog-id=107 op=LOAD Feb 9 18:37:17.363000 audit[3175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3164 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366135333233326565363034313562363632353161643564323135 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.363000 audit: BPF prog-id=108 op=LOAD Feb 9 18:37:17.363000 audit[3175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3164 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366135333233326565363034313562363632353161643564323135 Feb 9 18:37:17.364000 audit: BPF prog-id=108 op=UNLOAD Feb 9 18:37:17.364000 audit: BPF prog-id=107 op=UNLOAD Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { perfmon } for pid=3175 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit[3175]: AVC avc: denied { bpf } for pid=3175 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:17.364000 audit: BPF prog-id=109 op=LOAD Feb 9 18:37:17.364000 audit[3175]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3164 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:17.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662366135333233326565363034313562363632353161643564323135 Feb 9 18:37:17.384068 env[1358]: time="2024-02-09T18:37:17.384032972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:27c7fa68-00c1-41a8-9984-56aa84632558,Namespace:default,Attempt:0,} returns sandbox id \"fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850\"" Feb 9 18:37:17.386037 env[1358]: time="2024-02-09T18:37:17.386008355Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 18:37:17.713267 kubelet[1910]: E0209 18:37:17.713228 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:18.415869 systemd-networkd[1503]: cali60e51b789ff: Gained IPv6LL Feb 9 18:37:18.714381 kubelet[1910]: E0209 18:37:18.714236 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:19.714573 kubelet[1910]: E0209 18:37:19.714534 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:19.951599 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4178981914.mount: Deactivated successfully. Feb 9 18:37:20.714951 kubelet[1910]: E0209 18:37:20.714913 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:21.715579 kubelet[1910]: E0209 18:37:21.715535 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:22.154135 env[1358]: time="2024-02-09T18:37:22.154085084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:22.163540 env[1358]: time="2024-02-09T18:37:22.163498397Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:22.168663 env[1358]: time="2024-02-09T18:37:22.168625223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:22.173957 env[1358]: time="2024-02-09T18:37:22.173916124Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:22.174936 env[1358]: time="2024-02-09T18:37:22.174884978Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 18:37:22.178027 env[1358]: time="2024-02-09T18:37:22.177984057Z" level=info msg="CreateContainer within sandbox \"fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 18:37:22.206504 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount31974872.mount: Deactivated successfully. Feb 9 18:37:22.211001 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2480941282.mount: Deactivated successfully. Feb 9 18:37:22.226428 env[1358]: time="2024-02-09T18:37:22.226376309Z" level=info msg="CreateContainer within sandbox \"fb6a53232ee60415b66251ad5d21562cbca23922b4f72c67db963d0d95759850\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"53c9f1a215b48c3f2427b9d98461dda174c863bcf1bffe47ac0cde358155465f\"" Feb 9 18:37:22.227207 env[1358]: time="2024-02-09T18:37:22.227072090Z" level=info msg="StartContainer for \"53c9f1a215b48c3f2427b9d98461dda174c863bcf1bffe47ac0cde358155465f\"" Feb 9 18:37:22.244985 systemd[1]: Started cri-containerd-53c9f1a215b48c3f2427b9d98461dda174c863bcf1bffe47ac0cde358155465f.scope. Feb 9 18:37:22.263191 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 9 18:37:22.263308 kernel: audit: type=1400 audit(1707503842.255:776): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.301724 kernel: audit: type=1400 audit(1707503842.255:777): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.342444 kernel: audit: type=1400 audit(1707503842.255:778): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.342532 kernel: audit: type=1400 audit(1707503842.255:779): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.364502 kernel: audit: type=1400 audit(1707503842.255:780): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.384370 kernel: audit: type=1400 audit(1707503842.255:781): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.405458 kernel: audit: type=1400 audit(1707503842.255:782): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.427977 kernel: audit: type=1400 audit(1707503842.255:783): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.428113 kernel: audit: type=1400 audit(1707503842.255:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.261000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.466407 kernel: audit: type=1400 audit(1707503842.261:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.261000 audit: BPF prog-id=110 op=LOAD Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3164 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633966316132313562343863336632343237623964393834363164 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3164 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633966316132313562343863336632343237623964393834363164 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit: BPF prog-id=111 op=LOAD Feb 9 18:37:22.280000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3164 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633966316132313562343863336632343237623964393834363164 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.280000 audit: BPF prog-id=112 op=LOAD Feb 9 18:37:22.280000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3164 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633966316132313562343863336632343237623964393834363164 Feb 9 18:37:22.280000 audit: BPF prog-id=112 op=UNLOAD Feb 9 18:37:22.281000 audit: BPF prog-id=111 op=UNLOAD Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { perfmon } for pid=3205 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit[3205]: AVC avc: denied { bpf } for pid=3205 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:22.281000 audit: BPF prog-id=113 op=LOAD Feb 9 18:37:22.281000 audit[3205]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3164 pid=3205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533633966316132313562343863336632343237623964393834363164 Feb 9 18:37:22.456000 audit[3233]: AVC avc: denied { search } for pid=3233 comm="rpcbind" name="crypto" dev="proc" ino=20287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:37:22.456000 audit[3233]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa050f000 a2=0 a3=0 items=0 ppid=3215 pid=3233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 key=(null) Feb 9 18:37:22.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 18:37:22.468486 env[1358]: time="2024-02-09T18:37:22.468436724Z" level=info msg="StartContainer for \"53c9f1a215b48c3f2427b9d98461dda174c863bcf1bffe47ac0cde358155465f\" returns successfully" Feb 9 18:37:22.497000 audit[3238]: AVC avc: denied { search } for pid=3238 comm="dbus-daemon" name="crypto" dev="proc" ino=20287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:37:22.497000 audit[3238]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8d88f000 a2=0 a3=0 items=0 ppid=3215 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 key=(null) Feb 9 18:37:22.497000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:37:22.500000 audit[3239]: AVC avc: denied { watch } for pid=3239 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c554,c869 tclass=dir permissive=0 Feb 9 18:37:22.500000 audit[3239]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaab537c550 a2=2c8 a3=aaaab536aa60 items=0 ppid=3215 pid=3239 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 key=(null) Feb 9 18:37:22.500000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 18:37:22.505000 audit[3240]: AVC avc: denied { read } for pid=3240 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=21305 scontext=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 18:37:22.505000 audit[3240]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa91da570 a2=80000 a3=0 items=0 ppid=3215 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 key=(null) Feb 9 18:37:22.505000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:37:22.505000 audit[3240]: AVC avc: denied { search } for pid=3240 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 18:37:22.505000 audit[3240]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa856f000 a2=0 a3=0 items=0 ppid=3215 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c554,c869 key=(null) Feb 9 18:37:22.505000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 18:37:22.717211 kubelet[1910]: E0209 18:37:22.715993 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:22.883796 kubelet[1910]: I0209 18:37:22.883771 1910 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.093793404 podCreationTimestamp="2024-02-09 18:37:16 +0000 UTC" firstStartedPulling="2024-02-09 18:37:17.385397133 +0000 UTC m=+50.985097735" lastFinishedPulling="2024-02-09 18:37:22.175320887 +0000 UTC m=+55.775021489" observedRunningTime="2024-02-09 18:37:22.883390646 +0000 UTC m=+56.483091248" watchObservedRunningTime="2024-02-09 18:37:22.883717158 +0000 UTC m=+56.483417760" Feb 9 18:37:22.897000 audit[3245]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:22.897000 audit[3245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd0696ab0 a2=0 a3=ffff94b976c0 items=0 ppid=2117 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:22.900000 audit[3245]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3245 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 18:37:22.900000 audit[3245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffd0696ab0 a2=0 a3=ffff94b976c0 items=0 ppid=2117 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:22.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 18:37:23.716702 kubelet[1910]: E0209 18:37:23.716662 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:24.717743 kubelet[1910]: E0209 18:37:24.717703 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:25.718678 kubelet[1910]: E0209 18:37:25.718635 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:26.719319 kubelet[1910]: E0209 18:37:26.719278 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:27.677986 kubelet[1910]: E0209 18:37:27.677954 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:27.683752 env[1358]: time="2024-02-09T18:37:27.683705602Z" level=info msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" Feb 9 18:37:27.719969 kubelet[1910]: E0209 18:37:27.719931 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.719 [WARNING][3263] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--kt6ql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31f785c1-8e39-457a-b7c7-c3ade25ed512", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190", Pod:"csi-node-driver-kt6ql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia7bb24ba35b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.720 [INFO][3263] k8s.go 578: Cleaning up netns ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.720 [INFO][3263] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" iface="eth0" netns="" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.720 [INFO][3263] k8s.go 585: Releasing IP address(es) ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.720 [INFO][3263] utils.go 188: Calico CNI releasing IP address ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.738 [INFO][3269] ipam_plugin.go 415: Releasing address using handleID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.739 [INFO][3269] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.739 [INFO][3269] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.749 [WARNING][3269] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.749 [INFO][3269] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.750 [INFO][3269] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:27.752984 env[1358]: 2024-02-09 18:37:27.751 [INFO][3263] k8s.go 591: Teardown processing complete. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.752984 env[1358]: time="2024-02-09T18:37:27.752844460Z" level=info msg="TearDown network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" successfully" Feb 9 18:37:27.752984 env[1358]: time="2024-02-09T18:37:27.752875420Z" level=info msg="StopPodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" returns successfully" Feb 9 18:37:27.754853 env[1358]: time="2024-02-09T18:37:27.754829653Z" level=info msg="RemovePodSandbox for \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" Feb 9 18:37:27.754992 env[1358]: time="2024-02-09T18:37:27.754948130Z" level=info msg="Forcibly stopping sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\"" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.791 [WARNING][3289] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-csi--node--driver--kt6ql-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"31f785c1-8e39-457a-b7c7-c3ade25ed512", ResourceVersion:"1237", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6b50f810c5cd4592ffadc02ee904449baebe6dc00285f79da3f593db3ed1b190", Pod:"csi-node-driver-kt6ql", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia7bb24ba35b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.791 [INFO][3289] k8s.go 578: Cleaning up netns ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.791 [INFO][3289] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" iface="eth0" netns="" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.791 [INFO][3289] k8s.go 585: Releasing IP address(es) ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.791 [INFO][3289] utils.go 188: Calico CNI releasing IP address ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.807 [INFO][3295] ipam_plugin.go 415: Releasing address using handleID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.808 [INFO][3295] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.808 [INFO][3295] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.825 [WARNING][3295] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.825 [INFO][3295] ipam_plugin.go 443: Releasing address using workloadID ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" HandleID="k8s-pod-network.1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Workload="10.200.20.44-k8s-csi--node--driver--kt6ql-eth0" Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.826 [INFO][3295] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:27.828862 env[1358]: 2024-02-09 18:37:27.827 [INFO][3289] k8s.go 591: Teardown processing complete. ContainerID="1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf" Feb 9 18:37:27.829422 env[1358]: time="2024-02-09T18:37:27.829391461Z" level=info msg="TearDown network for sandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" successfully" Feb 9 18:37:27.838867 env[1358]: time="2024-02-09T18:37:27.838832634Z" level=info msg="RemovePodSandbox \"1623f7da9500a572b8e1856678330d4354ad24070602d6267ddebd2ab3bfddaf\" returns successfully" Feb 9 18:37:27.839474 env[1358]: time="2024-02-09T18:37:27.839451459Z" level=info msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.871 [WARNING][3313] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b4cad379-171c-4200-a269-3cef8ee0e1ae", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4", Pod:"nginx-deployment-6d5f899847-69vpv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0db02827097", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.871 [INFO][3313] k8s.go 578: Cleaning up netns ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.871 [INFO][3313] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" iface="eth0" netns="" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.871 [INFO][3313] k8s.go 585: Releasing IP address(es) ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.871 [INFO][3313] utils.go 188: Calico CNI releasing IP address ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.891 [INFO][3319] ipam_plugin.go 415: Releasing address using handleID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.891 [INFO][3319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.891 [INFO][3319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.906 [WARNING][3319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.906 [INFO][3319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.907 [INFO][3319] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:27.909910 env[1358]: 2024-02-09 18:37:27.908 [INFO][3313] k8s.go 591: Teardown processing complete. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.910449 env[1358]: time="2024-02-09T18:37:27.910416874Z" level=info msg="TearDown network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" successfully" Feb 9 18:37:27.910518 env[1358]: time="2024-02-09T18:37:27.910502632Z" level=info msg="StopPodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" returns successfully" Feb 9 18:37:27.910996 env[1358]: time="2024-02-09T18:37:27.910968980Z" level=info msg="RemovePodSandbox for \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" Feb 9 18:37:27.911049 env[1358]: time="2024-02-09T18:37:27.911002700Z" level=info msg="Forcibly stopping sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\"" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.942 [WARNING][3339] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"b4cad379-171c-4200-a269-3cef8ee0e1ae", ResourceVersion:"1261", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 36, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"6a8480425fe18bdb899d08132545707ac0b9b28970804d391c08c4583797e1f4", Pod:"nginx-deployment-6d5f899847-69vpv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali0db02827097", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.942 [INFO][3339] k8s.go 578: Cleaning up netns ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.942 [INFO][3339] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" iface="eth0" netns="" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.942 [INFO][3339] k8s.go 585: Releasing IP address(es) ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.942 [INFO][3339] utils.go 188: Calico CNI releasing IP address ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.958 [INFO][3345] ipam_plugin.go 415: Releasing address using handleID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.958 [INFO][3345] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.958 [INFO][3345] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.968 [WARNING][3345] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.968 [INFO][3345] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" HandleID="k8s-pod-network.7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Workload="10.200.20.44-k8s-nginx--deployment--6d5f899847--69vpv-eth0" Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.969 [INFO][3345] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:27.971785 env[1358]: 2024-02-09 18:37:27.970 [INFO][3339] k8s.go 591: Teardown processing complete. ContainerID="7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8" Feb 9 18:37:27.973547 env[1358]: time="2024-02-09T18:37:27.971765359Z" level=info msg="TearDown network for sandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" successfully" Feb 9 18:37:27.982898 env[1358]: time="2024-02-09T18:37:27.982859733Z" level=info msg="RemovePodSandbox \"7287d032b352008aaeac97fffcca2b9791a4c71adc9c15469bfa9e0c6c8275e8\" returns successfully" Feb 9 18:37:28.720833 kubelet[1910]: E0209 18:37:28.720785 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:29.720942 kubelet[1910]: E0209 18:37:29.720888 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:30.721523 kubelet[1910]: E0209 18:37:30.721491 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:31.722842 kubelet[1910]: E0209 18:37:31.722807 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:32.723727 kubelet[1910]: E0209 18:37:32.723689 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:33.724762 kubelet[1910]: E0209 18:37:33.724724 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:34.725423 kubelet[1910]: E0209 18:37:34.725386 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:35.725916 kubelet[1910]: E0209 18:37:35.725878 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:36.726370 kubelet[1910]: E0209 18:37:36.726314 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:37.727288 kubelet[1910]: E0209 18:37:37.727245 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:38.728269 kubelet[1910]: E0209 18:37:38.728223 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:39.729036 kubelet[1910]: E0209 18:37:39.729003 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:40.729542 kubelet[1910]: E0209 18:37:40.729505 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:41.730019 kubelet[1910]: E0209 18:37:41.729985 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:42.730834 kubelet[1910]: E0209 18:37:42.730796 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:43.731314 kubelet[1910]: E0209 18:37:43.731277 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:44.731747 kubelet[1910]: E0209 18:37:44.731712 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:45.732825 kubelet[1910]: E0209 18:37:45.732793 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:46.733745 kubelet[1910]: E0209 18:37:46.733696 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:47.500071 kubelet[1910]: I0209 18:37:47.499677 1910 topology_manager.go:215] "Topology Admit Handler" podUID="51ed5511-fcd7-4f8d-82f0-d4c0eb767752" podNamespace="default" podName="test-pod-1" Feb 9 18:37:47.504265 systemd[1]: Created slice kubepods-besteffort-pod51ed5511_fcd7_4f8d_82f0_d4c0eb767752.slice. Feb 9 18:37:47.624777 kubelet[1910]: I0209 18:37:47.624739 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5819a841-137f-46a3-90fd-87cdba9e89d0\" (UniqueName: \"kubernetes.io/nfs/51ed5511-fcd7-4f8d-82f0-d4c0eb767752-pvc-5819a841-137f-46a3-90fd-87cdba9e89d0\") pod \"test-pod-1\" (UID: \"51ed5511-fcd7-4f8d-82f0-d4c0eb767752\") " pod="default/test-pod-1" Feb 9 18:37:47.625021 kubelet[1910]: I0209 18:37:47.624997 1910 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dzc2h\" (UniqueName: \"kubernetes.io/projected/51ed5511-fcd7-4f8d-82f0-d4c0eb767752-kube-api-access-dzc2h\") pod \"test-pod-1\" (UID: \"51ed5511-fcd7-4f8d-82f0-d4c0eb767752\") " pod="default/test-pod-1" Feb 9 18:37:47.677971 kubelet[1910]: E0209 18:37:47.677876 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:47.733973 kubelet[1910]: E0209 18:37:47.733946 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:47.816015 kernel: Failed to create system directory netfs Feb 9 18:37:47.816155 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 18:37:47.816211 kernel: audit: type=1400 audit(1707503867.808:801): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.808000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.844787 kernel: Failed to create system directory netfs Feb 9 18:37:47.844947 kernel: audit: type=1400 audit(1707503867.808:801): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.808000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.872201 kernel: Failed to create system directory netfs Feb 9 18:37:47.872297 kernel: audit: type=1400 audit(1707503867.808:801): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.808000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.900369 kernel: Failed to create system directory netfs Feb 9 18:37:47.900439 kernel: audit: type=1400 audit(1707503867.808:801): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.808000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.808000 audit[3405]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab109155e0 a1=12c14 a2=aaaad246e028 a3=aaab10906010 items=0 ppid=551 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:47.962416 kernel: audit: type=1300 audit(1707503867.808:801): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab109155e0 a1=12c14 a2=aaaad246e028 a3=aaab10906010 items=0 ppid=551 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:47.973194 kernel: audit: type=1327 audit(1707503867.808:801): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:37:47.808000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.001840 kernel: audit: type=1400 audit(1707503867.963:802): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.001952 kernel: Failed to create system directory fscache Feb 9 18:37:48.001982 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.007503 kernel: audit: type=1400 audit(1707503867.963:802): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.035655 kernel: Failed to create system directory fscache Feb 9 18:37:48.035761 kernel: audit: type=1400 audit(1707503867.963:802): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.064941 kernel: Failed to create system directory fscache Feb 9 18:37:48.065034 kernel: audit: type=1400 audit(1707503867.963:802): avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.094096 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.099953 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.105542 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.111029 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.116840 kernel: Failed to create system directory fscache Feb 9 18:37:48.116908 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.126942 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.132602 kernel: Failed to create system directory fscache Feb 9 18:37:48.132669 kernel: Failed to create system directory fscache Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:47.963000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.143539 kernel: Failed to create system directory fscache Feb 9 18:37:48.147177 kernel: FS-Cache: Loaded Feb 9 18:37:47.963000 audit[3405]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab10b28210 a1=4c344 a2=aaaad246e028 a3=aaab10906010 items=0 ppid=551 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:47.963000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.214536 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.214636 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.214660 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.222166 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.229198 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.229238 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.243854 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.243906 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.243926 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.253291 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.253362 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.263131 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.263224 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.272657 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.272714 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.282339 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.282392 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.292688 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.292743 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.302375 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.302466 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.311360 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.316078 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.316133 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.325452 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.325541 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.334707 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.334790 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.343477 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.348030 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.348100 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.357244 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.357345 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.366093 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.370788 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.370872 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.379219 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.379278 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.387863 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.387921 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.396624 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.396684 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.405535 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.405598 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.414828 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.414877 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.423986 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.424045 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.432825 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.432877 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.441585 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.446181 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.446230 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.454895 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.454950 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.459361 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.468442 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.468494 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.478267 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.478332 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.487202 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.487280 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.496122 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.496227 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.504803 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.504857 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.509202 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.519603 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.519720 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.530027 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.535564 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.535638 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.545301 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.545385 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.554469 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.554540 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.563645 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.563709 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.573455 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.573512 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.582523 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.588555 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.588599 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.597447 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.597494 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.606673 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.611611 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.611672 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.620921 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.621038 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.630214 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.630319 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.640040 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.645039 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.645135 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.649882 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.659073 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.659133 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.668361 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.668420 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.677780 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.677845 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.686799 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.686862 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.700331 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.700415 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.700442 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.709901 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.709979 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.719248 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.719335 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.727907 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.727972 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.735316 kubelet[1910]: E0209 18:37:48.735292 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:48.736666 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.736730 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.745254 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.750012 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.750077 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.758932 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.759001 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.767632 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.767693 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.776483 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.776546 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.785203 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.785266 kernel: Failed to create system directory sunrpc Feb 9 18:37:48.199000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.802508 kernel: RPC: Registered named UNIX socket transport module. Feb 9 18:37:48.802618 kernel: RPC: Registered udp transport module. Feb 9 18:37:48.802668 kernel: RPC: Registered tcp transport module. Feb 9 18:37:48.806816 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 18:37:48.199000 audit[3405]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab10b74560 a1=fbb6c a2=aaaad246e028 a3=aaab10906010 items=6 ppid=551 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:48.199000 audit: CWD cwd="/" Feb 9 18:37:48.199000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PATH item=1 name=(null) inode=21690 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PATH item=2 name=(null) inode=21690 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PATH item=3 name=(null) inode=21691 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PATH item=4 name=(null) inode=21690 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PATH item=5 name=(null) inode=21692 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:37:48.199000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.901578 kernel: Failed to create system directory nfs Feb 9 18:37:48.901644 kernel: Failed to create system directory nfs Feb 9 18:37:48.901672 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.910537 kernel: Failed to create system directory nfs Feb 9 18:37:48.910618 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.919217 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.923691 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.928357 kernel: Failed to create system directory nfs Feb 9 18:37:48.928455 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.936950 kernel: Failed to create system directory nfs Feb 9 18:37:48.937015 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.945176 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.949787 kernel: Failed to create system directory nfs Feb 9 18:37:48.949826 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.958335 kernel: Failed to create system directory nfs Feb 9 18:37:48.958395 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.966704 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.971215 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.975421 kernel: Failed to create system directory nfs Feb 9 18:37:48.975472 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.984033 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.992852 kernel: Failed to create system directory nfs Feb 9 18:37:48.992956 kernel: Failed to create system directory nfs Feb 9 18:37:48.992998 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.001933 kernel: Failed to create system directory nfs Feb 9 18:37:49.002024 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.010175 kernel: Failed to create system directory nfs Feb 9 18:37:49.010245 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.018268 kernel: Failed to create system directory nfs Feb 9 18:37:49.018312 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.026443 kernel: Failed to create system directory nfs Feb 9 18:37:49.026491 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.034453 kernel: Failed to create system directory nfs Feb 9 18:37:49.034503 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.043007 kernel: Failed to create system directory nfs Feb 9 18:37:49.043075 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.051595 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.056178 kernel: Failed to create system directory nfs Feb 9 18:37:49.056222 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.065065 kernel: Failed to create system directory nfs Feb 9 18:37:49.065123 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.073281 kernel: Failed to create system directory nfs Feb 9 18:37:49.073354 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.081506 kernel: Failed to create system directory nfs Feb 9 18:37:49.081546 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.089868 kernel: Failed to create system directory nfs Feb 9 18:37:49.089922 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.094184 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.102404 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.108799 kernel: Failed to create system directory nfs Feb 9 18:37:49.108879 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.118269 kernel: Failed to create system directory nfs Feb 9 18:37:49.118330 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.123039 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.132156 kernel: Failed to create system directory nfs Feb 9 18:37:49.132222 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.142204 kernel: Failed to create system directory nfs Feb 9 18:37:49.142269 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:48.888000 audit[3405]: AVC avc: denied { confidentiality } for pid=3405 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.151066 kernel: Failed to create system directory nfs Feb 9 18:37:48.888000 audit[3405]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab10ca0b40 a1=ae35c a2=aaaad246e028 a3=aaab10906010 items=0 ppid=551 pid=3405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:48.888000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 18:37:49.166190 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.289037 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.289096 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.293239 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.293313 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.302453 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.302505 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.310706 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.310753 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.319210 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.319300 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.327708 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.327778 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.336391 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.336455 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.345108 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.345188 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.353678 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.353734 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.362198 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.362236 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.370479 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.370542 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.378770 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.378840 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.387108 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.387140 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.395429 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.395484 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.403928 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.408508 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.408544 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.416937 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.417021 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.425730 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.425840 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.434194 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.434242 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.442804 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.442861 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.451356 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.455685 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.460149 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.460208 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.468455 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.468518 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.477188 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.477244 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.485972 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.486023 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.496830 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.496881 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.505293 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.505360 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.514487 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.514529 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.523883 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.523959 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.532303 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.532347 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.540977 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.541021 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.545010 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.549260 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.553352 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.561609 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.566154 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.566238 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.574280 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.574311 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.578347 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.586873 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.586977 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.595393 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.595464 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.604049 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.604077 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.612592 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.617127 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.617209 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.625649 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.625703 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.634578 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.634610 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.643660 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.643721 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.651921 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.651970 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.660492 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.660541 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.669215 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.669270 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.678341 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.678396 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.273000 audit[3410]: AVC avc: denied { confidentiality } for pid=3410 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.687078 kernel: Failed to create system directory nfs4 Feb 9 18:37:49.736176 kubelet[1910]: E0209 18:37:49.735814 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:49.798823 kernel: NFS: Registering the id_resolver key type Feb 9 18:37:49.798969 kernel: Key type id_resolver registered Feb 9 18:37:49.799000 kernel: Key type id_legacy registered Feb 9 18:37:49.273000 audit[3410]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb2d6b010 a1=167c04 a2=aaaaaba5e028 a3=aaaae4868010 items=0 ppid=551 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:49.273000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.835281 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.835364 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.835451 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.844263 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.844312 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.853498 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.853549 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.862306 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.862385 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.871366 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.871437 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.880433 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.880485 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.889273 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.889304 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.898397 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.898433 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.907578 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.907633 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.916642 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.916696 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.925714 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.931181 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.931248 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.939980 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.940023 kernel: Failed to create system directory rpcgss Feb 9 18:37:49.823000 audit[3411]: AVC avc: denied { confidentiality } for pid=3411 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 18:37:49.823000 audit[3411]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff80f73010 a1=3e09c a2=aaaacb28e028 a3=aaaaefb3a010 items=0 ppid=551 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:49.823000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 18:37:50.276612 nfsidmap[3418]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-a0f092b2b2' Feb 9 18:37:50.378088 nfsidmap[3419]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-a0f092b2b2' Feb 9 18:37:50.387000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:37:50.387000 audit[1459]: AVC avc: denied { watch_reads } for pid=1459 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:37:50.387000 audit[1459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab00bab960 a2=10 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.387000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:37:50.387000 audit[1459]: AVC avc: denied { watch_reads } for pid=1459 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:37:50.387000 audit[1459]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab00bab960 a2=10 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.387000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 18:37:50.390000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2678 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 18:37:50.507135 env[1358]: time="2024-02-09T18:37:50.507081828Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:51ed5511-fcd7-4f8d-82f0-d4c0eb767752,Namespace:default,Attempt:0,}" Feb 9 18:37:50.633528 systemd-networkd[1503]: cali5ec59c6bf6e: Link UP Feb 9 18:37:50.647419 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:37:50.647521 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 18:37:50.654695 systemd-networkd[1503]: cali5ec59c6bf6e: Gained carrier Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.569 [INFO][3421] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.44-k8s-test--pod--1-eth0 default 51ed5511-fcd7-4f8d-82f0-d4c0eb767752 1399 0 2024-02-09 18:37:17 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.44 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.569 [INFO][3421] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.591 [INFO][3432] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" HandleID="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Workload="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.603 [INFO][3432] ipam_plugin.go 268: Auto assigning IP ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" HandleID="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Workload="10.200.20.44-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b5970), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.44", "pod":"test-pod-1", "timestamp":"2024-02-09 18:37:50.59174903 +0000 UTC"}, Hostname:"10.200.20.44", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.603 [INFO][3432] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.603 [INFO][3432] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.603 [INFO][3432] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.44' Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.605 [INFO][3432] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.608 [INFO][3432] ipam.go 372: Looking up existing affinities for host host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.611 [INFO][3432] ipam.go 489: Trying affinity for 192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.612 [INFO][3432] ipam.go 155: Attempting to load block cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.614 [INFO][3432] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.8.128/26 host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.615 [INFO][3432] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.8.128/26 handle="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.616 [INFO][3432] ipam.go 1682: Creating new handle: k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37 Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.619 [INFO][3432] ipam.go 1203: Writing block in order to claim IPs block=192.168.8.128/26 handle="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.625 [INFO][3432] ipam.go 1216: Successfully claimed IPs: [192.168.8.132/26] block=192.168.8.128/26 handle="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.625 [INFO][3432] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.8.132/26] handle="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" host="10.200.20.44" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.625 [INFO][3432] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.625 [INFO][3432] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.8.132/26] IPv6=[] ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" HandleID="k8s-pod-network.850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Workload="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.627 [INFO][3421] k8s.go 385: Populated endpoint ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"51ed5511-fcd7-4f8d-82f0-d4c0eb767752", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:50.666566 env[1358]: 2024-02-09 18:37:50.627 [INFO][3421] k8s.go 386: Calico CNI using IPs: [192.168.8.132/32] ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.667280 env[1358]: 2024-02-09 18:37:50.627 [INFO][3421] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.667280 env[1358]: 2024-02-09 18:37:50.655 [INFO][3421] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.667280 env[1358]: 2024-02-09 18:37:50.656 [INFO][3421] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.44-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"51ed5511-fcd7-4f8d-82f0-d4c0eb767752", ResourceVersion:"1399", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 18, 37, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.44", ContainerID:"850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.8.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"22:11:1d:a3:84:0d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 18:37:50.667280 env[1358]: 2024-02-09 18:37:50.661 [INFO][3421] k8s.go 491: Wrote updated endpoint to datastore ContainerID="850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.44-k8s-test--pod--1-eth0" Feb 9 18:37:50.680000 audit[3457]: NETFILTER_CFG table=filter:81 family=2 entries=38 op=nft_register_chain pid=3457 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 18:37:50.680000 audit[3457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19080 a0=3 a1=fffffc6fdab0 a2=0 a3=ffffafdd9fa8 items=0 ppid=2551 pid=3457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.680000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 18:37:50.683286 env[1358]: time="2024-02-09T18:37:50.683219593Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 18:37:50.683450 env[1358]: time="2024-02-09T18:37:50.683425629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 18:37:50.683559 env[1358]: time="2024-02-09T18:37:50.683538027Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 18:37:50.683884 env[1358]: time="2024-02-09T18:37:50.683833502Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37 pid=3463 runtime=io.containerd.runc.v2 Feb 9 18:37:50.698324 systemd[1]: Started cri-containerd-850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37.scope. Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit: BPF prog-id=114 op=LOAD Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3463 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306264623466323564633866316236313634323739316264343062 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3463 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306264623466323564633866316236313634323739316264343062 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit: BPF prog-id=115 op=LOAD Feb 9 18:37:50.711000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3463 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306264623466323564633866316236313634323739316264343062 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit: BPF prog-id=116 op=LOAD Feb 9 18:37:50.711000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3463 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306264623466323564633866316236313634323739316264343062 Feb 9 18:37:50.711000 audit: BPF prog-id=116 op=UNLOAD Feb 9 18:37:50.711000 audit: BPF prog-id=115 op=UNLOAD Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { perfmon } for pid=3472 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit[3472]: AVC avc: denied { bpf } for pid=3472 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:50.711000 audit: BPF prog-id=117 op=LOAD Feb 9 18:37:50.711000 audit[3472]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3463 pid=3472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:50.711000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835306264623466323564633866316236313634323739316264343062 Feb 9 18:37:50.736574 kubelet[1910]: E0209 18:37:50.736517 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:50.737882 env[1358]: time="2024-02-09T18:37:50.737849279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:51ed5511-fcd7-4f8d-82f0-d4c0eb767752,Namespace:default,Attempt:0,} returns sandbox id \"850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37\"" Feb 9 18:37:50.739911 env[1358]: time="2024-02-09T18:37:50.739885083Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 18:37:51.049553 env[1358]: time="2024-02-09T18:37:51.049502007Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:51.057786 env[1358]: time="2024-02-09T18:37:51.057741744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:51.061272 env[1358]: time="2024-02-09T18:37:51.061218644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:51.066890 env[1358]: time="2024-02-09T18:37:51.066859907Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 18:37:51.067704 env[1358]: time="2024-02-09T18:37:51.067276180Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 18:37:51.069846 env[1358]: time="2024-02-09T18:37:51.069817296Z" level=info msg="CreateContainer within sandbox \"850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 18:37:51.103918 env[1358]: time="2024-02-09T18:37:51.103869188Z" level=info msg="CreateContainer within sandbox \"850bdb4f25dc8f1b61642791bd40b7b68402975bb05446be08f98095b5636d37\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"674f8af4968da09e34f5bcc09756d1a36de957ec37edc4de67663522a4ea920d\"" Feb 9 18:37:51.104664 env[1358]: time="2024-02-09T18:37:51.104640054Z" level=info msg="StartContainer for \"674f8af4968da09e34f5bcc09756d1a36de957ec37edc4de67663522a4ea920d\"" Feb 9 18:37:51.118175 systemd[1]: Started cri-containerd-674f8af4968da09e34f5bcc09756d1a36de957ec37edc4de67663522a4ea920d.scope. Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit: BPF prog-id=118 op=LOAD Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3463 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:51.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637346638616634393638646130396533346635626363303937353664 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3463 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:51.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637346638616634393638646130396533346635626363303937353664 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit: BPF prog-id=119 op=LOAD Feb 9 18:37:51.130000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3463 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:51.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637346638616634393638646130396533346635626363303937353664 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit: BPF prog-id=120 op=LOAD Feb 9 18:37:51.130000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3463 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:51.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637346638616634393638646130396533346635626363303937353664 Feb 9 18:37:51.130000 audit: BPF prog-id=120 op=UNLOAD Feb 9 18:37:51.130000 audit: BPF prog-id=119 op=UNLOAD Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { perfmon } for pid=3503 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit[3503]: AVC avc: denied { bpf } for pid=3503 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 18:37:51.130000 audit: BPF prog-id=121 op=LOAD Feb 9 18:37:51.130000 audit[3503]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3463 pid=3503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:37:51.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637346638616634393638646130396533346635626363303937353664 Feb 9 18:37:51.152330 env[1358]: time="2024-02-09T18:37:51.152291311Z" level=info msg="StartContainer for \"674f8af4968da09e34f5bcc09756d1a36de957ec37edc4de67663522a4ea920d\" returns successfully" Feb 9 18:37:51.736613 kubelet[1910]: E0209 18:37:51.736580 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:52.078385 systemd-networkd[1503]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 18:37:52.736966 kubelet[1910]: E0209 18:37:52.736928 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:53.737239 kubelet[1910]: E0209 18:37:53.737202 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:54.738123 kubelet[1910]: E0209 18:37:54.738088 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:55.738903 kubelet[1910]: E0209 18:37:55.738868 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:56.739918 kubelet[1910]: E0209 18:37:56.739889 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:57.741305 kubelet[1910]: E0209 18:37:57.741269 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:58.741649 kubelet[1910]: E0209 18:37:58.741611 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:37:59.742685 kubelet[1910]: E0209 18:37:59.742655 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:00.743310 kubelet[1910]: E0209 18:38:00.743268 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:01.744377 kubelet[1910]: E0209 18:38:01.744343 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:02.745374 kubelet[1910]: E0209 18:38:02.745343 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:03.745790 kubelet[1910]: E0209 18:38:03.745766 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:04.747018 kubelet[1910]: E0209 18:38:04.746982 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:05.748050 kubelet[1910]: E0209 18:38:05.748010 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:06.749056 kubelet[1910]: E0209 18:38:06.749019 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:07.678324 kubelet[1910]: E0209 18:38:07.678281 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:07.750154 kubelet[1910]: E0209 18:38:07.750127 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:08.751052 kubelet[1910]: E0209 18:38:08.751023 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:08.899994 kubelet[1910]: E0209 18:38:08.899960 1910 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.36:57656->10.200.20.15:2379: read: connection timed out" Feb 9 18:38:09.751802 kubelet[1910]: E0209 18:38:09.751768 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:10.752215 kubelet[1910]: E0209 18:38:10.752185 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:11.753338 kubelet[1910]: E0209 18:38:11.753295 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:12.753663 kubelet[1910]: E0209 18:38:12.753628 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:13.754769 kubelet[1910]: E0209 18:38:13.754735 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:14.755876 kubelet[1910]: E0209 18:38:14.755846 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:15.757067 kubelet[1910]: E0209 18:38:15.757041 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:16.572833 systemd[1]: run-containerd-runc-k8s.io-2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2-runc.LkPxfb.mount: Deactivated successfully. Feb 9 18:38:16.758193 kubelet[1910]: E0209 18:38:16.758148 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:17.759168 kubelet[1910]: E0209 18:38:17.759119 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:18.759426 kubelet[1910]: E0209 18:38:18.759383 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:18.901324 kubelet[1910]: E0209 18:38:18.901196 1910 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:19.759841 kubelet[1910]: E0209 18:38:19.759811 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:20.760620 kubelet[1910]: E0209 18:38:20.760587 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:21.762039 kubelet[1910]: E0209 18:38:21.761990 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:22.762598 kubelet[1910]: E0209 18:38:22.762565 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:23.762786 kubelet[1910]: E0209 18:38:23.762760 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:24.763744 kubelet[1910]: E0209 18:38:24.763710 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:25.763910 kubelet[1910]: E0209 18:38:25.763862 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:26.764570 kubelet[1910]: E0209 18:38:26.764538 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:27.677520 kubelet[1910]: E0209 18:38:27.677482 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:27.765537 kubelet[1910]: E0209 18:38:27.765506 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:28.765778 kubelet[1910]: E0209 18:38:28.765751 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:28.902437 kubelet[1910]: E0209 18:38:28.902383 1910 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": context deadline exceeded" Feb 9 18:38:29.766978 kubelet[1910]: E0209 18:38:29.766952 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:30.768114 kubelet[1910]: E0209 18:38:30.768084 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:31.768820 kubelet[1910]: E0209 18:38:31.768796 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:32.770151 kubelet[1910]: E0209 18:38:32.770117 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:33.770301 kubelet[1910]: E0209 18:38:33.770257 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:34.771207 kubelet[1910]: E0209 18:38:34.771172 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:35.771513 kubelet[1910]: E0209 18:38:35.771481 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:36.772551 kubelet[1910]: E0209 18:38:36.772518 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:37.772639 kubelet[1910]: E0209 18:38:37.772604 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:38.773673 kubelet[1910]: E0209 18:38:38.773639 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:38.903347 kubelet[1910]: E0209 18:38:38.903323 1910 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:39.774653 kubelet[1910]: E0209 18:38:39.774624 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:40.775810 kubelet[1910]: E0209 18:38:40.775773 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:41.776176 kubelet[1910]: E0209 18:38:41.776131 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:42.777312 kubelet[1910]: E0209 18:38:42.777288 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:43.778567 kubelet[1910]: E0209 18:38:43.778532 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:44.778957 kubelet[1910]: E0209 18:38:44.778926 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:45.780344 kubelet[1910]: E0209 18:38:45.780307 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:46.572397 systemd[1]: run-containerd-runc-k8s.io-2b6b3dd51461ff9eb7131b27e62dd065879770716c589d92233bf98ee559c5d2-runc.oo811H.mount: Deactivated successfully. Feb 9 18:38:46.781094 kubelet[1910]: E0209 18:38:46.781057 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:47.678382 kubelet[1910]: E0209 18:38:47.678338 1910 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:47.781427 kubelet[1910]: E0209 18:38:47.781403 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:48.782248 kubelet[1910]: E0209 18:38:48.782217 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:48.904059 kubelet[1910]: E0209 18:38:48.904030 1910 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.44?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:48.904269 kubelet[1910]: I0209 18:38:48.904257 1910 controller.go:116] "failed to update lease using latest lease, fallback to ensure lease" err="failed 5 attempts to update lease" Feb 9 18:38:49.783635 kubelet[1910]: E0209 18:38:49.783605 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:50.784707 kubelet[1910]: E0209 18:38:50.784672 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:51.785393 kubelet[1910]: E0209 18:38:51.785357 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:52.144767 kubelet[1910]: E0209 18:38:52.144556 1910 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.44\": Get \"https://10.200.20.36:6443/api/v1/nodes/10.200.20.44?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 18:38:52.786129 kubelet[1910]: E0209 18:38:52.786101 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:53.107529 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.130248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.152830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.173436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.195676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.216777 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.216952 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.233201 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.267283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.267536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.302143 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.302365 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.337199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.337442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.372681 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.372928 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.410902 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.411197 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.449148 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.449414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.484277 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.484538 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.518457 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.518703 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.535190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.571487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.571732 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.606953 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.607204 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.637487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.637733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.668026 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.668294 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.697445 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.697724 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.727308 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.727531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.756640 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.756928 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.787182 kubelet[1910]: E0209 18:38:53.787139 1910 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 18:38:53.788233 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.788422 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.817746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.817972 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.852753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.852986 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.889860 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.890091 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.924934 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.925242 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.976925 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.977203 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 18:38:53.977323 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#270 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001