Feb 9 18:58:57.989959 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 9 18:58:57.989979 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Feb 9 17:24:35 -00 2024 Feb 9 18:58:57.989987 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 9 18:58:57.989994 kernel: printk: bootconsole [pl11] enabled Feb 9 18:58:57.989999 kernel: efi: EFI v2.70 by EDK II Feb 9 18:58:57.990005 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 9 18:58:57.990011 kernel: random: crng init done Feb 9 18:58:57.990016 kernel: ACPI: Early table checksum verification disabled Feb 9 18:58:57.990022 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 9 18:58:57.990027 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990033 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990040 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 9 18:58:57.990045 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990050 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990057 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990063 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990069 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990076 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990082 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 9 18:58:57.990087 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 9 18:58:57.990093 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 9 18:58:57.990099 kernel: NUMA: Failed to initialise from firmware Feb 9 18:58:57.990105 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:58:57.990110 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 9 18:58:57.990116 kernel: Zone ranges: Feb 9 18:58:57.990122 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 9 18:58:57.990127 kernel: DMA32 empty Feb 9 18:58:57.990134 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:58:57.990140 kernel: Movable zone start for each node Feb 9 18:58:57.990145 kernel: Early memory node ranges Feb 9 18:58:57.990151 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 9 18:58:57.990156 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 9 18:58:57.990162 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 9 18:58:57.990168 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 9 18:58:57.990173 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 9 18:58:57.990179 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 9 18:58:57.990185 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 9 18:58:57.990190 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 9 18:58:57.990196 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 9 18:58:57.990203 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 9 18:58:57.990212 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 9 18:58:57.990218 kernel: psci: probing for conduit method from ACPI. Feb 9 18:58:57.990224 kernel: psci: PSCIv1.1 detected in firmware. Feb 9 18:58:57.990230 kernel: psci: Using standard PSCI v0.2 function IDs Feb 9 18:58:57.990237 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 9 18:58:57.990243 kernel: psci: SMC Calling Convention v1.4 Feb 9 18:58:57.990249 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 9 18:58:57.990255 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 9 18:58:57.990261 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 9 18:58:57.990286 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 9 18:58:57.990292 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 9 18:58:57.990303 kernel: Detected PIPT I-cache on CPU0 Feb 9 18:58:57.990311 kernel: CPU features: detected: GIC system register CPU interface Feb 9 18:58:57.990317 kernel: CPU features: detected: Hardware dirty bit management Feb 9 18:58:57.990323 kernel: CPU features: detected: Spectre-BHB Feb 9 18:58:57.990330 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 9 18:58:57.990338 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 9 18:58:57.990344 kernel: CPU features: detected: ARM erratum 1418040 Feb 9 18:58:57.990350 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 9 18:58:57.990359 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 9 18:58:57.990367 kernel: Policy zone: Normal Feb 9 18:58:57.990375 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:58:57.990381 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 9 18:58:57.990387 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 9 18:58:57.990393 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 9 18:58:57.990399 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 9 18:58:57.990410 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 9 18:58:57.990416 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 9 18:58:57.990423 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 9 18:58:57.990429 kernel: trace event string verifier disabled Feb 9 18:58:57.990435 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 9 18:58:57.990441 kernel: rcu: RCU event tracing is enabled. Feb 9 18:58:57.990448 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 9 18:58:57.990454 kernel: Trampoline variant of Tasks RCU enabled. Feb 9 18:58:57.990464 kernel: Tracing variant of Tasks RCU enabled. Feb 9 18:58:57.990470 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 9 18:58:57.990476 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 9 18:58:57.990484 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 9 18:58:57.990490 kernel: GICv3: 960 SPIs implemented Feb 9 18:58:57.990496 kernel: GICv3: 0 Extended SPIs implemented Feb 9 18:58:57.990502 kernel: GICv3: Distributor has no Range Selector support Feb 9 18:58:57.990511 kernel: Root IRQ handler: gic_handle_irq Feb 9 18:58:57.990517 kernel: GICv3: 16 PPIs implemented Feb 9 18:58:57.990523 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 9 18:58:57.990529 kernel: ITS: No ITS available, not enabling LPIs Feb 9 18:58:57.990536 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:58:57.990542 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 9 18:58:57.990548 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 9 18:58:57.990554 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 9 18:58:57.990562 kernel: Console: colour dummy device 80x25 Feb 9 18:58:57.990568 kernel: printk: console [tty1] enabled Feb 9 18:58:57.990575 kernel: ACPI: Core revision 20210730 Feb 9 18:58:57.990585 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 9 18:58:57.990591 kernel: pid_max: default: 32768 minimum: 301 Feb 9 18:58:57.990597 kernel: LSM: Security Framework initializing Feb 9 18:58:57.990604 kernel: SELinux: Initializing. Feb 9 18:58:57.990610 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:58:57.990616 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 9 18:58:57.990624 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 9 18:58:57.990634 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 9 18:58:57.990640 kernel: rcu: Hierarchical SRCU implementation. Feb 9 18:58:57.990646 kernel: Remapping and enabling EFI services. Feb 9 18:58:57.990652 kernel: smp: Bringing up secondary CPUs ... Feb 9 18:58:57.990658 kernel: Detected PIPT I-cache on CPU1 Feb 9 18:58:57.990665 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 9 18:58:57.990671 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 9 18:58:57.990678 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 9 18:58:57.990688 kernel: smp: Brought up 1 node, 2 CPUs Feb 9 18:58:57.990695 kernel: SMP: Total of 2 processors activated. Feb 9 18:58:57.990701 kernel: CPU features: detected: 32-bit EL0 Support Feb 9 18:58:57.990707 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 9 18:58:57.990714 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 9 18:58:57.990720 kernel: CPU features: detected: CRC32 instructions Feb 9 18:58:57.990726 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 9 18:58:57.990735 kernel: CPU features: detected: LSE atomic instructions Feb 9 18:58:57.990741 kernel: CPU features: detected: Privileged Access Never Feb 9 18:58:57.990748 kernel: CPU: All CPU(s) started at EL1 Feb 9 18:58:57.990755 kernel: alternatives: patching kernel code Feb 9 18:58:57.990765 kernel: devtmpfs: initialized Feb 9 18:58:57.990772 kernel: KASLR enabled Feb 9 18:58:57.990779 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 9 18:58:57.990786 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 9 18:58:57.990795 kernel: pinctrl core: initialized pinctrl subsystem Feb 9 18:58:57.990801 kernel: SMBIOS 3.1.0 present. Feb 9 18:58:57.990808 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 9 18:58:57.990815 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 9 18:58:57.990822 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 9 18:58:57.990829 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 9 18:58:57.990836 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 9 18:58:57.990842 kernel: audit: initializing netlink subsys (disabled) Feb 9 18:58:57.990849 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Feb 9 18:58:57.990855 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 9 18:58:57.990862 kernel: cpuidle: using governor menu Feb 9 18:58:57.990873 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 9 18:58:57.990879 kernel: ASID allocator initialised with 32768 entries Feb 9 18:58:57.990886 kernel: ACPI: bus type PCI registered Feb 9 18:58:57.990893 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 9 18:58:57.990899 kernel: Serial: AMBA PL011 UART driver Feb 9 18:58:57.990906 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 9 18:58:57.990912 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 9 18:58:57.990919 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 9 18:58:57.990928 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 9 18:58:57.990936 kernel: cryptd: max_cpu_qlen set to 1000 Feb 9 18:58:57.990943 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 9 18:58:57.990949 kernel: ACPI: Added _OSI(Module Device) Feb 9 18:58:57.990956 kernel: ACPI: Added _OSI(Processor Device) Feb 9 18:58:57.990962 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 9 18:58:57.990969 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 9 18:58:57.990978 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 9 18:58:57.990985 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 9 18:58:57.990991 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 9 18:58:57.990999 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 9 18:58:57.991006 kernel: ACPI: Interpreter enabled Feb 9 18:58:57.991012 kernel: ACPI: Using GIC for interrupt routing Feb 9 18:58:57.991019 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 9 18:58:57.991028 kernel: printk: console [ttyAMA0] enabled Feb 9 18:58:57.991034 kernel: printk: bootconsole [pl11] disabled Feb 9 18:58:57.991041 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 9 18:58:57.991048 kernel: iommu: Default domain type: Translated Feb 9 18:58:57.991054 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 9 18:58:57.991062 kernel: vgaarb: loaded Feb 9 18:58:57.991068 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 9 18:58:57.991075 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 9 18:58:57.991084 kernel: PTP clock support registered Feb 9 18:58:57.991091 kernel: Registered efivars operations Feb 9 18:58:57.991097 kernel: No ACPI PMU IRQ for CPU0 Feb 9 18:58:57.991104 kernel: No ACPI PMU IRQ for CPU1 Feb 9 18:58:57.991110 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 9 18:58:57.991117 kernel: VFS: Disk quotas dquot_6.6.0 Feb 9 18:58:57.991128 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 9 18:58:57.991135 kernel: pnp: PnP ACPI init Feb 9 18:58:57.991141 kernel: pnp: PnP ACPI: found 0 devices Feb 9 18:58:57.991148 kernel: NET: Registered PF_INET protocol family Feb 9 18:58:57.991154 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 9 18:58:57.991161 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 9 18:58:57.991173 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 9 18:58:57.991181 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 9 18:58:57.991187 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 9 18:58:57.991197 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 9 18:58:57.991204 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:58:57.991213 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 9 18:58:57.991220 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 9 18:58:57.991226 kernel: PCI: CLS 0 bytes, default 64 Feb 9 18:58:57.991233 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 9 18:58:57.991240 kernel: kvm [1]: HYP mode not available Feb 9 18:58:57.991246 kernel: Initialise system trusted keyrings Feb 9 18:58:57.991255 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 9 18:58:57.992176 kernel: Key type asymmetric registered Feb 9 18:58:57.992191 kernel: Asymmetric key parser 'x509' registered Feb 9 18:58:57.992198 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 9 18:58:57.992206 kernel: io scheduler mq-deadline registered Feb 9 18:58:57.992213 kernel: io scheduler kyber registered Feb 9 18:58:57.992219 kernel: io scheduler bfq registered Feb 9 18:58:57.992227 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 9 18:58:57.992233 kernel: thunder_xcv, ver 1.0 Feb 9 18:58:57.992240 kernel: thunder_bgx, ver 1.0 Feb 9 18:58:57.992250 kernel: nicpf, ver 1.0 Feb 9 18:58:57.992257 kernel: nicvf, ver 1.0 Feb 9 18:58:57.992412 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 9 18:58:57.992476 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-09T18:58:57 UTC (1707505137) Feb 9 18:58:57.992485 kernel: efifb: probing for efifb Feb 9 18:58:57.992492 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 9 18:58:57.992499 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 9 18:58:57.992506 kernel: efifb: scrolling: redraw Feb 9 18:58:57.992515 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 9 18:58:57.992522 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:58:57.992529 kernel: fb0: EFI VGA frame buffer device Feb 9 18:58:57.992535 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 9 18:58:57.992542 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 9 18:58:57.992549 kernel: NET: Registered PF_INET6 protocol family Feb 9 18:58:57.992555 kernel: Segment Routing with IPv6 Feb 9 18:58:57.992562 kernel: In-situ OAM (IOAM) with IPv6 Feb 9 18:58:57.992568 kernel: NET: Registered PF_PACKET protocol family Feb 9 18:58:57.992576 kernel: Key type dns_resolver registered Feb 9 18:58:57.992583 kernel: registered taskstats version 1 Feb 9 18:58:57.992589 kernel: Loading compiled-in X.509 certificates Feb 9 18:58:57.992596 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 947a80114e81e2815f6db72a0d388260762488f9' Feb 9 18:58:57.992603 kernel: Key type .fscrypt registered Feb 9 18:58:57.992610 kernel: Key type fscrypt-provisioning registered Feb 9 18:58:57.992616 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 9 18:58:57.992623 kernel: ima: Allocated hash algorithm: sha1 Feb 9 18:58:57.992630 kernel: ima: No architecture policies found Feb 9 18:58:57.992637 kernel: Freeing unused kernel memory: 34688K Feb 9 18:58:57.992644 kernel: Run /init as init process Feb 9 18:58:57.992650 kernel: with arguments: Feb 9 18:58:57.992657 kernel: /init Feb 9 18:58:57.992664 kernel: with environment: Feb 9 18:58:57.992670 kernel: HOME=/ Feb 9 18:58:57.992676 kernel: TERM=linux Feb 9 18:58:57.992683 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 9 18:58:57.992691 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:58:57.992702 systemd[1]: Detected virtualization microsoft. Feb 9 18:58:57.992709 systemd[1]: Detected architecture arm64. Feb 9 18:58:57.992716 systemd[1]: Running in initrd. Feb 9 18:58:57.992723 systemd[1]: No hostname configured, using default hostname. Feb 9 18:58:57.992730 systemd[1]: Hostname set to . Feb 9 18:58:57.992738 systemd[1]: Initializing machine ID from random generator. Feb 9 18:58:57.992745 systemd[1]: Queued start job for default target initrd.target. Feb 9 18:58:57.992753 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:58:57.992760 systemd[1]: Reached target cryptsetup.target. Feb 9 18:58:57.992767 systemd[1]: Reached target paths.target. Feb 9 18:58:57.992775 systemd[1]: Reached target slices.target. Feb 9 18:58:57.992782 systemd[1]: Reached target swap.target. Feb 9 18:58:57.992788 systemd[1]: Reached target timers.target. Feb 9 18:58:57.992796 systemd[1]: Listening on iscsid.socket. Feb 9 18:58:57.992803 systemd[1]: Listening on iscsiuio.socket. Feb 9 18:58:57.992811 systemd[1]: Listening on systemd-journald-audit.socket. Feb 9 18:58:57.992818 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 9 18:58:57.992826 systemd[1]: Listening on systemd-journald.socket. Feb 9 18:58:57.992833 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:58:57.992840 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:58:57.992847 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:58:57.992854 systemd[1]: Reached target sockets.target. Feb 9 18:58:57.992861 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:58:57.992868 systemd[1]: Finished network-cleanup.service. Feb 9 18:58:57.992876 systemd[1]: Starting systemd-fsck-usr.service... Feb 9 18:58:57.992883 systemd[1]: Starting systemd-journald.service... Feb 9 18:58:57.992890 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:58:57.992897 systemd[1]: Starting systemd-resolved.service... Feb 9 18:58:57.992905 systemd[1]: Starting systemd-vconsole-setup.service... Feb 9 18:58:57.992917 systemd-journald[275]: Journal started Feb 9 18:58:57.992955 systemd-journald[275]: Runtime Journal (/run/log/journal/c738c1b8f2984b17b36cd6c704da7b9b) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:58:57.971438 systemd-modules-load[276]: Inserted module 'overlay' Feb 9 18:58:58.014333 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 9 18:58:58.007019 systemd-resolved[277]: Positive Trust Anchors: Feb 9 18:58:58.030515 systemd[1]: Started systemd-journald.service. Feb 9 18:58:58.030538 kernel: Bridge firewalling registered Feb 9 18:58:58.007027 systemd-resolved[277]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:58:58.007056 systemd-resolved[277]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:58:58.101258 kernel: audit: type=1130 audit(1707505138.071:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.101294 kernel: SCSI subsystem initialized Feb 9 18:58:58.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.009132 systemd-resolved[277]: Defaulting to hostname 'linux'. Feb 9 18:58:58.139674 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 9 18:58:58.139699 kernel: audit: type=1130 audit(1707505138.101:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.139709 kernel: device-mapper: uevent: version 1.0.3 Feb 9 18:58:58.139724 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 9 18:58:58.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.030542 systemd-modules-load[276]: Inserted module 'br_netfilter' Feb 9 18:58:58.071893 systemd[1]: Started systemd-resolved.service. Feb 9 18:58:58.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.101832 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:58:58.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.133344 systemd-modules-load[276]: Inserted module 'dm_multipath' Feb 9 18:58:58.215183 kernel: audit: type=1130 audit(1707505138.148:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.215221 kernel: audit: type=1130 audit(1707505138.172:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.215240 kernel: audit: type=1130 audit(1707505138.195:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.149191 systemd[1]: Finished systemd-fsck-usr.service. Feb 9 18:58:58.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.172590 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:58:58.245614 kernel: audit: type=1130 audit(1707505138.219:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.196386 systemd[1]: Finished systemd-vconsole-setup.service. Feb 9 18:58:58.219646 systemd[1]: Reached target nss-lookup.target. Feb 9 18:58:58.245291 systemd[1]: Starting dracut-cmdline-ask.service... Feb 9 18:58:58.253773 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:58:58.262407 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:58:58.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.277178 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:58:58.282640 systemd[1]: Finished dracut-cmdline-ask.service. Feb 9 18:58:58.346713 kernel: audit: type=1130 audit(1707505138.282:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.346739 kernel: audit: type=1130 audit(1707505138.305:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.346749 kernel: audit: type=1130 audit(1707505138.328:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.305000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.305633 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:58:58.359039 dracut-cmdline[298]: dracut-dracut-053 Feb 9 18:58:58.332173 systemd[1]: Starting dracut-cmdline.service... Feb 9 18:58:58.368071 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=680ffc8c0dfb23738bd19ec96ea37b5bbadfb5cebf23767d1d52c89a6d5c00b4 Feb 9 18:58:58.448287 kernel: Loading iSCSI transport class v2.0-870. Feb 9 18:58:58.459286 kernel: iscsi: registered transport (tcp) Feb 9 18:58:58.477571 kernel: iscsi: registered transport (qla4xxx) Feb 9 18:58:58.477589 kernel: QLogic iSCSI HBA Driver Feb 9 18:58:58.505900 systemd[1]: Finished dracut-cmdline.service. Feb 9 18:58:58.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.510867 systemd[1]: Starting dracut-pre-udev.service... Feb 9 18:58:58.562285 kernel: raid6: neonx8 gen() 13812 MB/s Feb 9 18:58:58.582274 kernel: raid6: neonx8 xor() 10828 MB/s Feb 9 18:58:58.602272 kernel: raid6: neonx4 gen() 13574 MB/s Feb 9 18:58:58.623275 kernel: raid6: neonx4 xor() 11224 MB/s Feb 9 18:58:58.643273 kernel: raid6: neonx2 gen() 12934 MB/s Feb 9 18:58:58.663278 kernel: raid6: neonx2 xor() 10241 MB/s Feb 9 18:58:58.684273 kernel: raid6: neonx1 gen() 10511 MB/s Feb 9 18:58:58.704272 kernel: raid6: neonx1 xor() 8791 MB/s Feb 9 18:58:58.724273 kernel: raid6: int64x8 gen() 6300 MB/s Feb 9 18:58:58.745273 kernel: raid6: int64x8 xor() 3549 MB/s Feb 9 18:58:58.765274 kernel: raid6: int64x4 gen() 7231 MB/s Feb 9 18:58:58.785273 kernel: raid6: int64x4 xor() 3853 MB/s Feb 9 18:58:58.806275 kernel: raid6: int64x2 gen() 6153 MB/s Feb 9 18:58:58.826272 kernel: raid6: int64x2 xor() 3324 MB/s Feb 9 18:58:58.846274 kernel: raid6: int64x1 gen() 5044 MB/s Feb 9 18:58:58.871147 kernel: raid6: int64x1 xor() 2646 MB/s Feb 9 18:58:58.871165 kernel: raid6: using algorithm neonx8 gen() 13812 MB/s Feb 9 18:58:58.871174 kernel: raid6: .... xor() 10828 MB/s, rmw enabled Feb 9 18:58:58.875084 kernel: raid6: using neon recovery algorithm Feb 9 18:58:58.895362 kernel: xor: measuring software checksum speed Feb 9 18:58:58.895376 kernel: 8regs : 17289 MB/sec Feb 9 18:58:58.899630 kernel: 32regs : 20755 MB/sec Feb 9 18:58:58.903421 kernel: arm64_neon : 27854 MB/sec Feb 9 18:58:58.903441 kernel: xor: using function: arm64_neon (27854 MB/sec) Feb 9 18:58:58.962280 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 9 18:58:58.971106 systemd[1]: Finished dracut-pre-udev.service. Feb 9 18:58:58.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:58.978000 audit: BPF prog-id=7 op=LOAD Feb 9 18:58:58.978000 audit: BPF prog-id=8 op=LOAD Feb 9 18:58:58.979538 systemd[1]: Starting systemd-udevd.service... Feb 9 18:58:58.993429 systemd-udevd[475]: Using default interface naming scheme 'v252'. Feb 9 18:58:59.000379 systemd[1]: Started systemd-udevd.service. Feb 9 18:58:59.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:59.010324 systemd[1]: Starting dracut-pre-trigger.service... Feb 9 18:58:59.022670 dracut-pre-trigger[496]: rd.md=0: removing MD RAID activation Feb 9 18:58:59.055056 systemd[1]: Finished dracut-pre-trigger.service. Feb 9 18:58:59.059000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:59.060190 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:58:59.094492 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:58:59.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:58:59.146299 kernel: hv_vmbus: Vmbus version:5.3 Feb 9 18:58:59.167294 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 9 18:58:59.167352 kernel: hv_vmbus: registering driver hv_netvsc Feb 9 18:58:59.167362 kernel: hv_vmbus: registering driver hv_storvsc Feb 9 18:58:59.167370 kernel: hv_vmbus: registering driver hid_hyperv Feb 9 18:58:59.173282 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 9 18:58:59.190759 kernel: scsi host0: storvsc_host_t Feb 9 18:58:59.190931 kernel: scsi host1: storvsc_host_t Feb 9 18:58:59.191014 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 9 18:58:59.203658 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 9 18:58:59.203704 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 9 18:58:59.214283 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 9 18:58:59.237965 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 9 18:58:59.238172 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 9 18:58:59.245287 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 9 18:58:59.245440 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 9 18:58:59.249774 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 9 18:58:59.253830 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 9 18:58:59.253980 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 9 18:58:59.254062 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 9 18:58:59.267281 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:58:59.272283 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 9 18:58:59.296289 kernel: hv_netvsc 002248b9-1900-0022-48b9-1900002248b9 eth0: VF slot 1 added Feb 9 18:58:59.303311 kernel: hv_vmbus: registering driver hv_pci Feb 9 18:58:59.317684 kernel: hv_pci fe9ccb6c-08a4-403d-8b41-88eae4c6f0b0: PCI VMBus probing: Using version 0x10004 Feb 9 18:58:59.330107 kernel: hv_pci fe9ccb6c-08a4-403d-8b41-88eae4c6f0b0: PCI host bridge to bus 08a4:00 Feb 9 18:58:59.330303 kernel: pci_bus 08a4:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 9 18:58:59.336278 kernel: pci_bus 08a4:00: No busn resource found for root bus, will use [bus 00-ff] Feb 9 18:58:59.343377 kernel: pci 08a4:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 9 18:58:59.354594 kernel: pci 08a4:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:58:59.375317 kernel: pci 08a4:00:02.0: enabling Extended Tags Feb 9 18:58:59.399027 kernel: pci 08a4:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 08a4:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 9 18:58:59.399231 kernel: pci_bus 08a4:00: busn_res: [bus 00-ff] end is updated to 00 Feb 9 18:58:59.405349 kernel: pci 08a4:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 9 18:58:59.446303 kernel: mlx5_core 08a4:00:02.0: firmware version: 16.30.1284 Feb 9 18:58:59.603298 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 9 18:58:59.622282 kernel: mlx5_core 08a4:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 9 18:58:59.680923 kernel: hv_netvsc 002248b9-1900-0022-48b9-1900002248b9 eth0: VF registering: eth1 Feb 9 18:58:59.681210 kernel: mlx5_core 08a4:00:02.0 eth1: joined to eth0 Feb 9 18:58:59.692310 kernel: mlx5_core 08a4:00:02.0 enP2212s1: renamed from eth1 Feb 9 18:58:59.701285 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (538) Feb 9 18:58:59.717226 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:58:59.820924 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 9 18:58:59.878953 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 9 18:58:59.884461 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 9 18:58:59.900360 systemd[1]: Starting disk-uuid.service... Feb 9 18:58:59.925301 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:58:59.933289 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:59:00.941788 disk-uuid[604]: The operation has completed successfully. Feb 9 18:59:00.946681 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 9 18:59:00.999523 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 9 18:59:01.001477 systemd[1]: Finished disk-uuid.service. Feb 9 18:59:01.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.012154 systemd[1]: Starting verity-setup.service... Feb 9 18:59:01.050347 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 9 18:59:01.218261 systemd[1]: Found device dev-mapper-usr.device. Feb 9 18:59:01.224773 systemd[1]: Mounting sysusr-usr.mount... Feb 9 18:59:01.237609 systemd[1]: Finished verity-setup.service. Feb 9 18:59:01.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.295318 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 9 18:59:01.295837 systemd[1]: Mounted sysusr-usr.mount. Feb 9 18:59:01.300527 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 9 18:59:01.301252 systemd[1]: Starting ignition-setup.service... Feb 9 18:59:01.309251 systemd[1]: Starting parse-ip-for-networkd.service... Feb 9 18:59:01.348543 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:59:01.348589 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:59:01.353630 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:59:01.397967 systemd[1]: Finished parse-ip-for-networkd.service. Feb 9 18:59:01.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.407000 audit: BPF prog-id=9 op=LOAD Feb 9 18:59:01.407682 systemd[1]: Starting systemd-networkd.service... Feb 9 18:59:01.432392 systemd-networkd[842]: lo: Link UP Feb 9 18:59:01.432401 systemd-networkd[842]: lo: Gained carrier Feb 9 18:59:01.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.432785 systemd-networkd[842]: Enumeration completed Feb 9 18:59:01.436033 systemd[1]: Started systemd-networkd.service. Feb 9 18:59:01.441100 systemd[1]: Reached target network.target. Feb 9 18:59:01.444649 systemd-networkd[842]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:59:01.457332 systemd[1]: Starting iscsiuio.service... Feb 9 18:59:01.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.465226 systemd[1]: Started iscsiuio.service. Feb 9 18:59:01.483930 iscsid[847]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:59:01.483930 iscsid[847]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 9 18:59:01.483930 iscsid[847]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 9 18:59:01.483930 iscsid[847]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 9 18:59:01.483930 iscsid[847]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 9 18:59:01.483930 iscsid[847]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 9 18:59:01.483930 iscsid[847]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 9 18:59:01.605549 kernel: mlx5_core 08a4:00:02.0 enP2212s1: Link up Feb 9 18:59:01.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.479382 systemd[1]: Starting iscsid.service... Feb 9 18:59:01.487133 systemd[1]: Started iscsid.service. Feb 9 18:59:01.516232 systemd[1]: Starting dracut-initqueue.service... Feb 9 18:59:01.551566 systemd[1]: Finished dracut-initqueue.service. Feb 9 18:59:01.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.556734 systemd[1]: Reached target remote-fs-pre.target. Feb 9 18:59:01.649910 kernel: hv_netvsc 002248b9-1900-0022-48b9-1900002248b9 eth0: Data path switched to VF: enP2212s1 Feb 9 18:59:01.650084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 18:59:01.561732 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:59:01.571173 systemd[1]: Reached target remote-fs.target. Feb 9 18:59:01.585453 systemd[1]: Starting dracut-pre-mount.service... Feb 9 18:59:01.607819 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 9 18:59:01.614838 systemd[1]: Finished dracut-pre-mount.service. Feb 9 18:59:01.640339 systemd-networkd[842]: enP2212s1: Link UP Feb 9 18:59:01.640530 systemd-networkd[842]: eth0: Link UP Feb 9 18:59:01.649843 systemd-networkd[842]: eth0: Gained carrier Feb 9 18:59:01.665436 systemd-networkd[842]: enP2212s1: Gained carrier Feb 9 18:59:01.691354 systemd-networkd[842]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:59:01.967443 systemd[1]: Finished ignition-setup.service. Feb 9 18:59:01.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:01.972555 systemd[1]: Starting ignition-fetch-offline.service... Feb 9 18:59:03.167418 systemd-networkd[842]: eth0: Gained IPv6LL Feb 9 18:59:04.602523 ignition[869]: Ignition 2.14.0 Feb 9 18:59:04.605690 ignition[869]: Stage: fetch-offline Feb 9 18:59:04.605769 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:04.605802 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:04.715314 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:04.715484 ignition[869]: parsed url from cmdline: "" Feb 9 18:59:04.715488 ignition[869]: no config URL provided Feb 9 18:59:04.715494 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:59:04.731569 systemd[1]: Finished ignition-fetch-offline.service. Feb 9 18:59:04.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:04.715503 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:59:04.777835 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 9 18:59:04.777863 kernel: audit: type=1130 audit(1707505144.741:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:04.743097 systemd[1]: Starting ignition-fetch.service... Feb 9 18:59:04.715511 ignition[869]: failed to fetch config: resource requires networking Feb 9 18:59:04.715787 ignition[869]: Ignition finished successfully Feb 9 18:59:04.772845 ignition[875]: Ignition 2.14.0 Feb 9 18:59:04.772851 ignition[875]: Stage: fetch Feb 9 18:59:04.772956 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:04.772982 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:04.777036 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:04.777623 ignition[875]: parsed url from cmdline: "" Feb 9 18:59:04.777629 ignition[875]: no config URL provided Feb 9 18:59:04.777639 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 9 18:59:04.777650 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 9 18:59:04.777709 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 9 18:59:04.862831 ignition[875]: GET result: OK Feb 9 18:59:04.862861 ignition[875]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 9 18:59:04.903169 ignition[875]: opening config device: "/dev/sr0" Feb 9 18:59:04.903584 ignition[875]: getting drive status for "/dev/sr0" Feb 9 18:59:04.903651 ignition[875]: drive status: OK Feb 9 18:59:04.903695 ignition[875]: mounting config device Feb 9 18:59:04.903709 ignition[875]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure4153684651" Feb 9 18:59:04.924291 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/10 00:00 (1000) Feb 9 18:59:04.923655 ignition[875]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure4153684651" Feb 9 18:59:04.923664 ignition[875]: checking for config drive Feb 9 18:59:04.929605 systemd[1]: tmp-ignition\x2dazure4153684651.mount: Deactivated successfully. Feb 9 18:59:04.923974 ignition[875]: reading config Feb 9 18:59:04.929312 ignition[875]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure4153684651" Feb 9 18:59:04.931182 ignition[875]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure4153684651" Feb 9 18:59:04.931198 ignition[875]: config has been read from custom data Feb 9 18:59:04.931300 ignition[875]: parsing config with SHA512: f22a3562baa2947a25bd13b5ccf4a3e4d1b2a8b3d013c4ccbd6d6b9e708c613717b408cfb7bc819f52dfb381fa446dcc03bd341e0a06985b66117e094eb9a51b Feb 9 18:59:04.958186 unknown[875]: fetched base config from "system" Feb 9 18:59:04.958193 unknown[875]: fetched base config from "system" Feb 9 18:59:04.959055 ignition[875]: fetch: fetch complete Feb 9 18:59:04.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:04.958198 unknown[875]: fetched user config from "azure" Feb 9 18:59:04.959063 ignition[875]: fetch: fetch passed Feb 9 18:59:04.965822 systemd[1]: Finished ignition-fetch.service. Feb 9 18:59:05.008125 kernel: audit: type=1130 audit(1707505144.972:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:04.959120 ignition[875]: Ignition finished successfully Feb 9 18:59:04.973709 systemd[1]: Starting ignition-kargs.service... Feb 9 18:59:05.004751 ignition[882]: Ignition 2.14.0 Feb 9 18:59:05.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.016501 systemd[1]: Finished ignition-kargs.service. Feb 9 18:59:05.004757 ignition[882]: Stage: kargs Feb 9 18:59:05.052376 kernel: audit: type=1130 audit(1707505145.020:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.041131 systemd[1]: Starting ignition-disks.service... Feb 9 18:59:05.004870 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:05.004891 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:05.007498 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:05.010339 ignition[882]: kargs: kargs passed Feb 9 18:59:05.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.069411 systemd[1]: Finished ignition-disks.service. Feb 9 18:59:05.111425 kernel: audit: type=1130 audit(1707505145.073:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.010387 ignition[882]: Ignition finished successfully Feb 9 18:59:05.092430 systemd[1]: Reached target initrd-root-device.target. Feb 9 18:59:05.054629 ignition[888]: Ignition 2.14.0 Feb 9 18:59:05.098835 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:59:05.054635 ignition[888]: Stage: disks Feb 9 18:59:05.103386 systemd[1]: Reached target local-fs.target. Feb 9 18:59:05.054745 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:05.110320 systemd[1]: Reached target sysinit.target. Feb 9 18:59:05.054768 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:05.115478 systemd[1]: Reached target basic.target. Feb 9 18:59:05.062637 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:05.128367 systemd[1]: Starting systemd-fsck-root.service... Feb 9 18:59:05.064213 ignition[888]: disks: disks passed Feb 9 18:59:05.064282 ignition[888]: Ignition finished successfully Feb 9 18:59:05.179742 systemd-fsck[896]: ROOT: clean, 602/7326000 files, 481069/7359488 blocks Feb 9 18:59:05.186740 systemd[1]: Finished systemd-fsck-root.service. Feb 9 18:59:05.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.212752 systemd[1]: Mounting sysroot.mount... Feb 9 18:59:05.220919 kernel: audit: type=1130 audit(1707505145.191:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.234279 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 9 18:59:05.234419 systemd[1]: Mounted sysroot.mount. Feb 9 18:59:05.238207 systemd[1]: Reached target initrd-root-fs.target. Feb 9 18:59:05.269162 systemd[1]: Mounting sysroot-usr.mount... Feb 9 18:59:05.273739 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 9 18:59:05.280866 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 9 18:59:05.280897 systemd[1]: Reached target ignition-diskful.target. Feb 9 18:59:05.286447 systemd[1]: Mounted sysroot-usr.mount. Feb 9 18:59:05.332313 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:59:05.337318 systemd[1]: Starting initrd-setup-root.service... Feb 9 18:59:05.358851 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory Feb 9 18:59:05.364948 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) Feb 9 18:59:05.376906 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:59:05.376948 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:59:05.381904 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:59:05.381934 initrd-setup-root[919]: cut: /sysroot/etc/group: No such file or directory Feb 9 18:59:05.389506 initrd-setup-root[943]: cut: /sysroot/etc/shadow: No such file or directory Feb 9 18:59:05.398671 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:59:05.418035 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory Feb 9 18:59:05.835409 systemd[1]: Finished initrd-setup-root.service. Feb 9 18:59:05.867459 kernel: audit: type=1130 audit(1707505145.839:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.840997 systemd[1]: Starting ignition-mount.service... Feb 9 18:59:05.864255 systemd[1]: Starting sysroot-boot.service... Feb 9 18:59:05.892419 systemd[1]: Finished sysroot-boot.service. Feb 9 18:59:05.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.920609 kernel: audit: type=1130 audit(1707505145.896:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.920652 ignition[974]: INFO : Ignition 2.14.0 Feb 9 18:59:05.920652 ignition[974]: INFO : Stage: mount Feb 9 18:59:05.920652 ignition[974]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:05.920652 ignition[974]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:05.920652 ignition[974]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:05.975315 kernel: audit: type=1130 audit(1707505145.933:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:05.975387 ignition[974]: INFO : mount: mount passed Feb 9 18:59:05.975387 ignition[974]: INFO : Ignition finished successfully Feb 9 18:59:05.924820 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 9 18:59:05.924886 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 9 18:59:05.925399 systemd[1]: Finished ignition-mount.service. Feb 9 18:59:06.489414 coreos-metadata[905]: Feb 09 18:59:06.489 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 18:59:06.497606 coreos-metadata[905]: Feb 09 18:59:06.497 INFO Fetch successful Feb 9 18:59:06.524652 coreos-metadata[905]: Feb 09 18:59:06.524 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 9 18:59:06.536037 coreos-metadata[905]: Feb 09 18:59:06.535 INFO Fetch successful Feb 9 18:59:06.541491 coreos-metadata[905]: Feb 09 18:59:06.541 INFO wrote hostname ci-3510.3.2-a-c004c0b513 to /sysroot/etc/hostname Feb 9 18:59:06.550357 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 9 18:59:06.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:06.583233 kernel: audit: type=1130 audit(1707505146.556:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:06.577540 systemd[1]: Starting ignition-files.service... Feb 9 18:59:06.592564 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 9 18:59:06.615216 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (984) Feb 9 18:59:06.615253 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 9 18:59:06.615280 kernel: BTRFS info (device sda6): using free space tree Feb 9 18:59:06.624781 kernel: BTRFS info (device sda6): has skinny extents Feb 9 18:59:06.629373 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 9 18:59:06.646026 ignition[1003]: INFO : Ignition 2.14.0 Feb 9 18:59:06.646026 ignition[1003]: INFO : Stage: files Feb 9 18:59:06.655591 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:06.655591 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:06.655591 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:06.655591 ignition[1003]: DEBUG : files: compiled without relabeling support, skipping Feb 9 18:59:06.655591 ignition[1003]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 9 18:59:06.655591 ignition[1003]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 9 18:59:06.732199 ignition[1003]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 9 18:59:06.739396 ignition[1003]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 9 18:59:06.746306 ignition[1003]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 9 18:59:06.746306 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 18:59:06.746306 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 9 18:59:06.743633 unknown[1003]: wrote ssh authorized keys file for user: core Feb 9 18:59:07.187127 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 9 18:59:07.399886 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 9 18:59:07.416054 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 9 18:59:07.416054 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 18:59:07.416054 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 9 18:59:07.810823 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 9 18:59:07.951186 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 9 18:59:07.967237 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 9 18:59:07.967237 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:59:07.967237 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 9 18:59:08.160030 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 9 18:59:08.454678 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 9 18:59:08.470531 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 9 18:59:08.470531 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:59:08.470531 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 9 18:59:08.530128 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 9 18:59:09.227179 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:59:09.244580 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 9 18:59:09.329486 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1003) Feb 9 18:59:09.320712 systemd[1]: mnt-oem3135330407.mount: Deactivated successfully. Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3135330407" Feb 9 18:59:09.334709 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3135330407": device or resource busy Feb 9 18:59:09.334709 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3135330407", trying btrfs: device or resource busy Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3135330407" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3135330407" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3135330407" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3135330407" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:59:09.334709 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 9 18:59:09.488876 kernel: audit: type=1130 audit(1707505149.415:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.371974 systemd[1]: mnt-oem2285589416.mount: Deactivated successfully. Feb 9 18:59:09.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2285589416" Feb 9 18:59:09.503994 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2285589416": device or resource busy Feb 9 18:59:09.503994 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2285589416", trying btrfs: device or resource busy Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2285589416" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2285589416" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2285589416" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2285589416" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 9 18:59:09.503994 ignition[1003]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 9 18:59:09.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.391630 systemd[1]: Finished ignition-files.service. Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(18): [started] setting preset to enabled for "waagent.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(18): [finished] setting preset to enabled for "waagent.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(19): [started] setting preset to enabled for "nvidia.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(19): [finished] setting preset to enabled for "nvidia.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 9 18:59:09.715205 ignition[1003]: INFO : files: files passed Feb 9 18:59:09.715205 ignition[1003]: INFO : Ignition finished successfully Feb 9 18:59:09.908905 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 9 18:59:09.908931 kernel: audit: type=1131 audit(1707505149.878:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.909018 initrd-setup-root-after-ignition[1028]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 9 18:59:09.418338 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 9 18:59:09.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.442426 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 9 18:59:09.444448 systemd[1]: Starting ignition-quench.service... Feb 9 18:59:09.981596 kernel: audit: type=1131 audit(1707505149.925:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.981618 kernel: audit: type=1131 audit(1707505149.961:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.468054 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 9 18:59:09.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.468152 systemd[1]: Finished ignition-quench.service. Feb 9 18:59:10.029041 kernel: audit: type=1131 audit(1707505149.985:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.029069 kernel: audit: type=1131 audit(1707505150.011:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.493889 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 9 18:59:09.500503 systemd[1]: Reached target ignition-complete.target. Feb 9 18:59:10.050706 ignition[1041]: INFO : Ignition 2.14.0 Feb 9 18:59:10.050706 ignition[1041]: INFO : Stage: umount Feb 9 18:59:10.050706 ignition[1041]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 9 18:59:10.050706 ignition[1041]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 9 18:59:10.174504 kernel: audit: type=1131 audit(1707505150.065:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.174536 kernel: audit: type=1131 audit(1707505150.090:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.174547 kernel: audit: type=1131 audit(1707505150.115:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.174557 kernel: audit: type=1131 audit(1707505150.151:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.509380 systemd[1]: Starting initrd-parse-etc.service... Feb 9 18:59:10.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.197368 iscsid[847]: iscsid shutting down. Feb 9 18:59:10.206017 kernel: audit: type=1131 audit(1707505150.178:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.206070 ignition[1041]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 9 18:59:10.206070 ignition[1041]: INFO : umount: umount passed Feb 9 18:59:10.206070 ignition[1041]: INFO : Ignition finished successfully Feb 9 18:59:10.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.537953 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 9 18:59:09.538077 systemd[1]: Finished initrd-parse-etc.service. Feb 9 18:59:09.554460 systemd[1]: Reached target initrd-fs.target. Feb 9 18:59:09.568508 systemd[1]: Reached target initrd.target. Feb 9 18:59:09.582457 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 9 18:59:10.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.583412 systemd[1]: Starting dracut-pre-pivot.service... Feb 9 18:59:09.651926 systemd[1]: Finished dracut-pre-pivot.service. Feb 9 18:59:09.664113 systemd[1]: Starting initrd-cleanup.service... Feb 9 18:59:10.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.691425 systemd[1]: Stopped target nss-lookup.target. Feb 9 18:59:09.700203 systemd[1]: Stopped target remote-cryptsetup.target. Feb 9 18:59:09.711474 systemd[1]: Stopped target timers.target. Feb 9 18:59:09.719189 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 9 18:59:09.719339 systemd[1]: Stopped dracut-pre-pivot.service. Feb 9 18:59:10.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.733641 systemd[1]: Stopped target initrd.target. Feb 9 18:59:10.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.748966 systemd[1]: Stopped target basic.target. Feb 9 18:59:10.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.360000 audit: BPF prog-id=6 op=UNLOAD Feb 9 18:59:09.759198 systemd[1]: Stopped target ignition-complete.target. Feb 9 18:59:09.771048 systemd[1]: Stopped target ignition-diskful.target. Feb 9 18:59:10.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.782611 systemd[1]: Stopped target initrd-root-device.target. Feb 9 18:59:10.388000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.794255 systemd[1]: Stopped target remote-fs.target. Feb 9 18:59:10.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.805763 systemd[1]: Stopped target remote-fs-pre.target. Feb 9 18:59:09.817427 systemd[1]: Stopped target sysinit.target. Feb 9 18:59:10.420000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.828779 systemd[1]: Stopped target local-fs.target. Feb 9 18:59:09.840907 systemd[1]: Stopped target local-fs-pre.target. Feb 9 18:59:09.852914 systemd[1]: Stopped target swap.target. Feb 9 18:59:09.865817 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 9 18:59:10.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.865945 systemd[1]: Stopped dracut-pre-mount.service. Feb 9 18:59:10.461000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.904529 systemd[1]: Stopped target cryptsetup.target. Feb 9 18:59:10.483578 kernel: hv_netvsc 002248b9-1900-0022-48b9-1900002248b9 eth0: Data path switched from VF: enP2212s1 Feb 9 18:59:10.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.913208 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 9 18:59:09.913324 systemd[1]: Stopped dracut-initqueue.service. Feb 9 18:59:09.946825 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 9 18:59:09.946955 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 9 18:59:10.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.961916 systemd[1]: ignition-files.service: Deactivated successfully. Feb 9 18:59:10.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.962004 systemd[1]: Stopped ignition-files.service. Feb 9 18:59:10.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.985459 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 9 18:59:10.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:09.985553 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 9 18:59:10.014896 systemd[1]: Stopping ignition-mount.service... Feb 9 18:59:10.042492 systemd[1]: Stopping iscsid.service... Feb 9 18:59:10.046764 systemd[1]: Stopping sysroot-boot.service... Feb 9 18:59:10.061137 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 9 18:59:10.061306 systemd[1]: Stopped systemd-udev-trigger.service. Feb 9 18:59:10.083390 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 9 18:59:10.083537 systemd[1]: Stopped dracut-pre-trigger.service. Feb 9 18:59:10.105360 systemd[1]: iscsid.service: Deactivated successfully. Feb 9 18:59:10.105467 systemd[1]: Stopped iscsid.service. Feb 9 18:59:10.116716 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 9 18:59:10.116813 systemd[1]: Stopped ignition-mount.service. Feb 9 18:59:10.152578 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 9 18:59:10.153057 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 9 18:59:10.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.153162 systemd[1]: Stopped ignition-disks.service. Feb 9 18:59:10.178614 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 9 18:59:10.178717 systemd[1]: Stopped ignition-kargs.service. Feb 9 18:59:10.203071 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 9 18:59:10.203158 systemd[1]: Stopped ignition-fetch.service. Feb 9 18:59:10.210018 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 9 18:59:10.210113 systemd[1]: Stopped ignition-fetch-offline.service. Feb 9 18:59:10.221508 systemd[1]: Stopped target paths.target. Feb 9 18:59:10.229752 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 9 18:59:10.239290 systemd[1]: Stopped systemd-ask-password-console.path. Feb 9 18:59:10.246783 systemd[1]: Stopped target slices.target. Feb 9 18:59:10.254754 systemd[1]: Stopped target sockets.target. Feb 9 18:59:10.265016 systemd[1]: iscsid.socket: Deactivated successfully. Feb 9 18:59:10.265112 systemd[1]: Closed iscsid.socket. Feb 9 18:59:10.272381 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 9 18:59:10.272470 systemd[1]: Stopped ignition-setup.service. Feb 9 18:59:10.277140 systemd[1]: Stopping iscsiuio.service... Feb 9 18:59:10.294007 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 9 18:59:10.294103 systemd[1]: Stopped iscsiuio.service. Feb 9 18:59:10.301817 systemd[1]: Stopped target network.target. Feb 9 18:59:10.310574 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 9 18:59:10.310616 systemd[1]: Closed iscsiuio.socket. Feb 9 18:59:10.318168 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:59:10.326432 systemd[1]: Stopping systemd-resolved.service... Feb 9 18:59:10.329585 systemd-networkd[842]: eth0: DHCPv6 lease lost Feb 9 18:59:10.710000 audit: BPF prog-id=9 op=UNLOAD Feb 9 18:59:10.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.334405 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:59:10.334504 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:59:10.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:10.344943 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 9 18:59:10.345034 systemd[1]: Stopped systemd-resolved.service. Feb 9 18:59:10.352839 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 9 18:59:10.352917 systemd[1]: Finished initrd-cleanup.service. Feb 9 18:59:10.361534 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 9 18:59:10.361575 systemd[1]: Closed systemd-networkd.socket. Feb 9 18:59:10.368583 systemd[1]: Stopping network-cleanup.service... Feb 9 18:59:10.375794 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 9 18:59:10.375864 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 9 18:59:10.795741 systemd-journald[275]: Received SIGTERM from PID 1 (systemd). Feb 9 18:59:10.380431 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 9 18:59:10.380475 systemd[1]: Stopped systemd-sysctl.service. Feb 9 18:59:10.392679 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 9 18:59:10.392722 systemd[1]: Stopped systemd-modules-load.service. Feb 9 18:59:10.397613 systemd[1]: Stopping systemd-udevd.service... Feb 9 18:59:10.413704 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 9 18:59:10.414254 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 9 18:59:10.414395 systemd[1]: Stopped systemd-udevd.service. Feb 9 18:59:10.421937 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 9 18:59:10.421984 systemd[1]: Closed systemd-udevd-control.socket. Feb 9 18:59:10.433021 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 9 18:59:10.433063 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 9 18:59:10.441329 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 9 18:59:10.441380 systemd[1]: Stopped dracut-pre-udev.service. Feb 9 18:59:10.451973 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 9 18:59:10.452031 systemd[1]: Stopped dracut-cmdline.service. Feb 9 18:59:10.461673 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 9 18:59:10.461719 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 9 18:59:10.482965 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 9 18:59:10.498193 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 9 18:59:10.498545 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 9 18:59:10.514462 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 9 18:59:10.514524 systemd[1]: Stopped kmod-static-nodes.service. Feb 9 18:59:10.518953 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 9 18:59:10.518999 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 9 18:59:10.529507 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 9 18:59:10.530020 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 9 18:59:10.530161 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 9 18:59:10.596193 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 9 18:59:10.596312 systemd[1]: Stopped network-cleanup.service. Feb 9 18:59:10.708977 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 9 18:59:10.709179 systemd[1]: Stopped sysroot-boot.service. Feb 9 18:59:10.715518 systemd[1]: Reached target initrd-switch-root.target. Feb 9 18:59:10.725316 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 9 18:59:10.725381 systemd[1]: Stopped initrd-setup-root.service. Feb 9 18:59:10.735626 systemd[1]: Starting initrd-switch-root.service... Feb 9 18:59:10.753275 systemd[1]: Switching root. Feb 9 18:59:10.796670 systemd-journald[275]: Journal stopped Feb 9 18:59:22.509163 kernel: SELinux: Class mctp_socket not defined in policy. Feb 9 18:59:22.509182 kernel: SELinux: Class anon_inode not defined in policy. Feb 9 18:59:22.509192 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 9 18:59:22.509202 kernel: SELinux: policy capability network_peer_controls=1 Feb 9 18:59:22.509210 kernel: SELinux: policy capability open_perms=1 Feb 9 18:59:22.509217 kernel: SELinux: policy capability extended_socket_class=1 Feb 9 18:59:22.509226 kernel: SELinux: policy capability always_check_network=0 Feb 9 18:59:22.509234 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 9 18:59:22.509243 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 9 18:59:22.509251 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 9 18:59:22.509260 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 9 18:59:22.509279 systemd[1]: Successfully loaded SELinux policy in 299.121ms. Feb 9 18:59:22.509289 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 20.206ms. Feb 9 18:59:22.509299 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 9 18:59:22.509310 systemd[1]: Detected virtualization microsoft. Feb 9 18:59:22.509319 systemd[1]: Detected architecture arm64. Feb 9 18:59:22.509328 systemd[1]: Detected first boot. Feb 9 18:59:22.509337 systemd[1]: Hostname set to . Feb 9 18:59:22.509346 systemd[1]: Initializing machine ID from random generator. Feb 9 18:59:22.509355 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 9 18:59:22.509363 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 9 18:59:22.509372 kernel: audit: type=1400 audit(1707505154.903:89): avc: denied { associate } for pid=1074 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:59:22.509384 kernel: audit: type=1300 audit(1707505154.903:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022814 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:22.509393 kernel: audit: type=1327 audit(1707505154.903:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:59:22.509403 kernel: audit: type=1400 audit(1707505154.917:90): avc: denied { associate } for pid=1074 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:59:22.509412 kernel: audit: type=1300 audit(1707505154.917:90): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228f9 a2=1ed a3=0 items=2 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:22.509421 kernel: audit: type=1307 audit(1707505154.917:90): cwd="/" Feb 9 18:59:22.509431 kernel: audit: type=1302 audit(1707505154.917:90): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:22.509440 kernel: audit: type=1302 audit(1707505154.917:90): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:22.509451 kernel: audit: type=1327 audit(1707505154.917:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:59:22.509460 systemd[1]: Populated /etc with preset unit settings. Feb 9 18:59:22.509469 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 18:59:22.509478 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 18:59:22.509489 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 18:59:22.509498 kernel: audit: type=1334 audit(1707505161.827:91): prog-id=12 op=LOAD Feb 9 18:59:22.509507 kernel: audit: type=1334 audit(1707505161.827:92): prog-id=3 op=UNLOAD Feb 9 18:59:22.509515 kernel: audit: type=1334 audit(1707505161.827:93): prog-id=13 op=LOAD Feb 9 18:59:22.509523 kernel: audit: type=1334 audit(1707505161.827:94): prog-id=14 op=LOAD Feb 9 18:59:22.509532 kernel: audit: type=1334 audit(1707505161.827:95): prog-id=4 op=UNLOAD Feb 9 18:59:22.509540 kernel: audit: type=1334 audit(1707505161.827:96): prog-id=5 op=UNLOAD Feb 9 18:59:22.509551 kernel: audit: type=1334 audit(1707505161.834:97): prog-id=15 op=LOAD Feb 9 18:59:22.509560 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 9 18:59:22.509570 kernel: audit: type=1334 audit(1707505161.834:98): prog-id=12 op=UNLOAD Feb 9 18:59:22.509579 systemd[1]: Stopped initrd-switch-root.service. Feb 9 18:59:22.509588 kernel: audit: type=1334 audit(1707505161.839:99): prog-id=16 op=LOAD Feb 9 18:59:22.509597 kernel: audit: type=1334 audit(1707505161.845:100): prog-id=17 op=LOAD Feb 9 18:59:22.509606 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 9 18:59:22.509615 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 9 18:59:22.509624 systemd[1]: Created slice system-addon\x2drun.slice. Feb 9 18:59:22.509635 systemd[1]: Created slice system-getty.slice. Feb 9 18:59:22.509645 systemd[1]: Created slice system-modprobe.slice. Feb 9 18:59:22.509654 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 9 18:59:22.509664 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 9 18:59:22.509673 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 9 18:59:22.509682 systemd[1]: Created slice user.slice. Feb 9 18:59:22.509691 systemd[1]: Started systemd-ask-password-console.path. Feb 9 18:59:22.509700 systemd[1]: Started systemd-ask-password-wall.path. Feb 9 18:59:22.509709 systemd[1]: Set up automount boot.automount. Feb 9 18:59:22.509720 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 9 18:59:22.509729 systemd[1]: Stopped target initrd-switch-root.target. Feb 9 18:59:22.509738 systemd[1]: Stopped target initrd-fs.target. Feb 9 18:59:22.509747 systemd[1]: Stopped target initrd-root-fs.target. Feb 9 18:59:22.509756 systemd[1]: Reached target integritysetup.target. Feb 9 18:59:22.509766 systemd[1]: Reached target remote-cryptsetup.target. Feb 9 18:59:22.509775 systemd[1]: Reached target remote-fs.target. Feb 9 18:59:22.509784 systemd[1]: Reached target slices.target. Feb 9 18:59:22.509794 systemd[1]: Reached target swap.target. Feb 9 18:59:22.509804 systemd[1]: Reached target torcx.target. Feb 9 18:59:22.509813 systemd[1]: Reached target veritysetup.target. Feb 9 18:59:22.509822 systemd[1]: Listening on systemd-coredump.socket. Feb 9 18:59:22.509831 systemd[1]: Listening on systemd-initctl.socket. Feb 9 18:59:22.509841 systemd[1]: Listening on systemd-networkd.socket. Feb 9 18:59:22.509852 systemd[1]: Listening on systemd-udevd-control.socket. Feb 9 18:59:22.509862 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 9 18:59:22.509871 systemd[1]: Listening on systemd-userdbd.socket. Feb 9 18:59:22.509880 systemd[1]: Mounting dev-hugepages.mount... Feb 9 18:59:22.509890 systemd[1]: Mounting dev-mqueue.mount... Feb 9 18:59:22.509899 systemd[1]: Mounting media.mount... Feb 9 18:59:22.509908 systemd[1]: Mounting sys-kernel-debug.mount... Feb 9 18:59:22.509918 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 9 18:59:22.509928 systemd[1]: Mounting tmp.mount... Feb 9 18:59:22.509937 systemd[1]: Starting flatcar-tmpfiles.service... Feb 9 18:59:22.509947 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 9 18:59:22.509956 systemd[1]: Starting kmod-static-nodes.service... Feb 9 18:59:22.509966 systemd[1]: Starting modprobe@configfs.service... Feb 9 18:59:22.509975 systemd[1]: Starting modprobe@dm_mod.service... Feb 9 18:59:22.509985 systemd[1]: Starting modprobe@drm.service... Feb 9 18:59:22.509994 systemd[1]: Starting modprobe@efi_pstore.service... Feb 9 18:59:22.510004 systemd[1]: Starting modprobe@fuse.service... Feb 9 18:59:22.510014 systemd[1]: Starting modprobe@loop.service... Feb 9 18:59:22.510024 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 9 18:59:22.510033 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 9 18:59:22.510044 systemd[1]: Stopped systemd-fsck-root.service. Feb 9 18:59:22.510053 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 9 18:59:22.510062 kernel: loop: module loaded Feb 9 18:59:22.510071 systemd[1]: Stopped systemd-fsck-usr.service. Feb 9 18:59:22.510081 systemd[1]: Stopped systemd-journald.service. Feb 9 18:59:22.510091 systemd[1]: systemd-journald.service: Consumed 3.096s CPU time. Feb 9 18:59:22.510100 kernel: fuse: init (API version 7.34) Feb 9 18:59:22.510109 systemd[1]: Starting systemd-journald.service... Feb 9 18:59:22.510118 systemd[1]: Starting systemd-modules-load.service... Feb 9 18:59:22.510128 systemd[1]: Starting systemd-network-generator.service... Feb 9 18:59:22.510137 systemd[1]: Starting systemd-remount-fs.service... Feb 9 18:59:22.510146 systemd[1]: Starting systemd-udev-trigger.service... Feb 9 18:59:22.510155 systemd[1]: verity-setup.service: Deactivated successfully. Feb 9 18:59:22.510164 systemd[1]: Stopped verity-setup.service. Feb 9 18:59:22.510175 systemd[1]: Mounted dev-hugepages.mount. Feb 9 18:59:22.510184 systemd[1]: Mounted dev-mqueue.mount. Feb 9 18:59:22.510193 systemd[1]: Mounted media.mount. Feb 9 18:59:22.510202 systemd[1]: Mounted sys-kernel-debug.mount. Feb 9 18:59:22.510212 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 9 18:59:22.510221 systemd[1]: Mounted tmp.mount. Feb 9 18:59:22.510230 systemd[1]: Finished flatcar-tmpfiles.service. Feb 9 18:59:22.510241 systemd[1]: Finished kmod-static-nodes.service. Feb 9 18:59:22.510254 systemd-journald[1180]: Journal started Feb 9 18:59:22.510301 systemd-journald[1180]: Runtime Journal (/run/log/journal/9aeeb090395d4350b51cfd309456f542) is 8.0M, max 78.6M, 70.6M free. Feb 9 18:59:13.177000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 9 18:59:13.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:59:13.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 9 18:59:13.797000 audit: BPF prog-id=10 op=LOAD Feb 9 18:59:13.797000 audit: BPF prog-id=10 op=UNLOAD Feb 9 18:59:13.797000 audit: BPF prog-id=11 op=LOAD Feb 9 18:59:13.797000 audit: BPF prog-id=11 op=UNLOAD Feb 9 18:59:14.903000 audit[1074]: AVC avc: denied { associate } for pid=1074 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 9 18:59:14.903000 audit[1074]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=4000022814 a1=4000028ac8 a2=4000026d00 a3=32 items=0 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:14.903000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:59:14.917000 audit[1074]: AVC avc: denied { associate } for pid=1074 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 9 18:59:14.917000 audit[1074]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40000228f9 a2=1ed a3=0 items=2 ppid=1057 pid=1074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:14.917000 audit: CWD cwd="/" Feb 9 18:59:14.917000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:14.917000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:14.917000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 9 18:59:21.827000 audit: BPF prog-id=12 op=LOAD Feb 9 18:59:21.827000 audit: BPF prog-id=3 op=UNLOAD Feb 9 18:59:21.827000 audit: BPF prog-id=13 op=LOAD Feb 9 18:59:21.827000 audit: BPF prog-id=14 op=LOAD Feb 9 18:59:21.827000 audit: BPF prog-id=4 op=UNLOAD Feb 9 18:59:21.827000 audit: BPF prog-id=5 op=UNLOAD Feb 9 18:59:21.834000 audit: BPF prog-id=15 op=LOAD Feb 9 18:59:21.834000 audit: BPF prog-id=12 op=UNLOAD Feb 9 18:59:21.839000 audit: BPF prog-id=16 op=LOAD Feb 9 18:59:21.845000 audit: BPF prog-id=17 op=LOAD Feb 9 18:59:21.845000 audit: BPF prog-id=13 op=UNLOAD Feb 9 18:59:21.845000 audit: BPF prog-id=14 op=UNLOAD Feb 9 18:59:21.850000 audit: BPF prog-id=18 op=LOAD Feb 9 18:59:21.850000 audit: BPF prog-id=15 op=UNLOAD Feb 9 18:59:21.856000 audit: BPF prog-id=19 op=LOAD Feb 9 18:59:21.862000 audit: BPF prog-id=20 op=LOAD Feb 9 18:59:21.862000 audit: BPF prog-id=16 op=UNLOAD Feb 9 18:59:21.862000 audit: BPF prog-id=17 op=UNLOAD Feb 9 18:59:21.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:21.884000 audit: BPF prog-id=18 op=UNLOAD Feb 9 18:59:21.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:21.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.369000 audit: BPF prog-id=21 op=LOAD Feb 9 18:59:22.369000 audit: BPF prog-id=22 op=LOAD Feb 9 18:59:22.369000 audit: BPF prog-id=23 op=LOAD Feb 9 18:59:22.369000 audit: BPF prog-id=19 op=UNLOAD Feb 9 18:59:22.369000 audit: BPF prog-id=20 op=UNLOAD Feb 9 18:59:22.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.506000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 9 18:59:22.506000 audit[1180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=fffffd857520 a2=4000 a3=1 items=0 ppid=1 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:22.506000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 9 18:59:22.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:14.853016 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 18:59:21.826523 systemd[1]: Queued start job for default target multi-user.target. Feb 9 18:59:14.880713 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:59:21.863726 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 9 18:59:14.880733 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:59:21.864102 systemd[1]: systemd-journald.service: Consumed 3.096s CPU time. Feb 9 18:59:14.880770 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 9 18:59:14.880780 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 9 18:59:14.880816 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 9 18:59:14.880828 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 9 18:59:14.881030 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 9 18:59:14.881064 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 9 18:59:14.881076 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 9 18:59:14.891919 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 9 18:59:14.891977 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 9 18:59:14.892012 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 9 18:59:14.892027 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 9 18:59:14.892045 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 9 18:59:14.892058 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 9 18:59:20.676569 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:59:20.676825 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:59:20.676915 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:59:20.677069 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 9 18:59:20.677115 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 9 18:59:20.677168 /usr/lib/systemd/system-generators/torcx-generator[1074]: time="2024-02-09T18:59:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 9 18:59:22.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.524644 systemd[1]: Started systemd-journald.service. Feb 9 18:59:22.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.525163 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 9 18:59:22.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.525335 systemd[1]: Finished modprobe@configfs.service. Feb 9 18:59:22.529904 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 9 18:59:22.530250 systemd[1]: Finished modprobe@dm_mod.service. Feb 9 18:59:22.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.534692 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 9 18:59:22.534857 systemd[1]: Finished modprobe@drm.service. Feb 9 18:59:22.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.539231 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 9 18:59:22.539361 systemd[1]: Finished modprobe@efi_pstore.service. Feb 9 18:59:22.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.544152 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 9 18:59:22.544305 systemd[1]: Finished modprobe@fuse.service. Feb 9 18:59:22.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.549004 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 9 18:59:22.549144 systemd[1]: Finished modprobe@loop.service. Feb 9 18:59:22.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.553862 systemd[1]: Finished systemd-network-generator.service. Feb 9 18:59:22.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.559116 systemd[1]: Finished systemd-remount-fs.service. Feb 9 18:59:22.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.563609 systemd[1]: Finished systemd-udev-trigger.service. Feb 9 18:59:22.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.569640 systemd[1]: Reached target network-pre.target. Feb 9 18:59:22.575111 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 9 18:59:22.580198 systemd[1]: Mounting sys-kernel-config.mount... Feb 9 18:59:22.584042 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 9 18:59:22.585743 systemd[1]: Starting systemd-hwdb-update.service... Feb 9 18:59:22.590966 systemd[1]: Starting systemd-journal-flush.service... Feb 9 18:59:22.595088 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 9 18:59:22.596093 systemd[1]: Starting systemd-random-seed.service... Feb 9 18:59:22.600381 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 9 18:59:22.601492 systemd[1]: Starting systemd-sysusers.service... Feb 9 18:59:22.606243 systemd[1]: Starting systemd-udev-settle.service... Feb 9 18:59:22.611841 systemd[1]: Finished systemd-modules-load.service. Feb 9 18:59:22.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.617492 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 9 18:59:22.622325 systemd[1]: Mounted sys-kernel-config.mount. Feb 9 18:59:22.629491 systemd[1]: Starting systemd-sysctl.service... Feb 9 18:59:22.635691 udevadm[1192]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 9 18:59:22.641687 systemd[1]: Finished systemd-random-seed.service. Feb 9 18:59:22.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.646915 systemd-journald[1180]: Time spent on flushing to /var/log/journal/9aeeb090395d4350b51cfd309456f542 is 19.200ms for 1136 entries. Feb 9 18:59:22.646915 systemd-journald[1180]: System Journal (/var/log/journal/9aeeb090395d4350b51cfd309456f542) is 8.0M, max 2.6G, 2.6G free. Feb 9 18:59:22.742538 systemd-journald[1180]: Received client request to flush runtime journal. Feb 9 18:59:22.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:22.646598 systemd[1]: Reached target first-boot-complete.target. Feb 9 18:59:22.715988 systemd[1]: Finished systemd-sysctl.service. Feb 9 18:59:22.743895 systemd[1]: Finished systemd-journal-flush.service. Feb 9 18:59:22.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:23.194099 systemd[1]: Finished systemd-sysusers.service. Feb 9 18:59:23.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:23.199847 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 9 18:59:23.477813 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 9 18:59:23.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:23.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:23.780329 systemd[1]: Finished systemd-hwdb-update.service. Feb 9 18:59:23.785000 audit: BPF prog-id=24 op=LOAD Feb 9 18:59:23.785000 audit: BPF prog-id=25 op=LOAD Feb 9 18:59:23.785000 audit: BPF prog-id=7 op=UNLOAD Feb 9 18:59:23.785000 audit: BPF prog-id=8 op=UNLOAD Feb 9 18:59:23.786151 systemd[1]: Starting systemd-udevd.service... Feb 9 18:59:23.803936 systemd-udevd[1199]: Using default interface naming scheme 'v252'. Feb 9 18:59:24.046020 systemd[1]: Started systemd-udevd.service. Feb 9 18:59:24.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.055000 audit: BPF prog-id=26 op=LOAD Feb 9 18:59:24.056847 systemd[1]: Starting systemd-networkd.service... Feb 9 18:59:24.078668 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 9 18:59:24.112000 audit: BPF prog-id=27 op=LOAD Feb 9 18:59:24.112000 audit: BPF prog-id=28 op=LOAD Feb 9 18:59:24.112000 audit: BPF prog-id=29 op=LOAD Feb 9 18:59:24.113295 systemd[1]: Starting systemd-userdbd.service... Feb 9 18:59:24.130292 kernel: mousedev: PS/2 mouse device common for all mice Feb 9 18:59:24.154000 audit[1213]: AVC avc: denied { confidentiality } for pid=1213 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 9 18:59:24.165292 kernel: hv_vmbus: registering driver hv_balloon Feb 9 18:59:24.174758 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 9 18:59:24.174924 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 9 18:59:24.183820 kernel: hv_vmbus: registering driver hyperv_fb Feb 9 18:59:24.180516 systemd[1]: Started systemd-userdbd.service. Feb 9 18:59:24.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.198608 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 9 18:59:24.198682 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 9 18:59:24.208288 kernel: Console: switching to colour dummy device 80x25 Feb 9 18:59:23.842108 kernel: hv_utils: Registering HyperV Utility Driver Feb 9 18:59:23.953115 kernel: hv_vmbus: registering driver hv_utils Feb 9 18:59:23.953145 kernel: hv_utils: Heartbeat IC version 3.0 Feb 9 18:59:23.953157 kernel: hv_utils: Shutdown IC version 3.2 Feb 9 18:59:23.953169 kernel: hv_utils: TimeSync IC version 4.0 Feb 9 18:59:23.953180 systemd-journald[1180]: Time jumped backwards, rotating. Feb 9 18:59:23.953262 kernel: Console: switching to colour frame buffer device 128x48 Feb 9 18:59:24.154000 audit[1213]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab126256e0 a1=aa2c a2=ffffaef824b0 a3=aaab12580010 items=12 ppid=1199 pid=1213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:24.154000 audit: CWD cwd="/" Feb 9 18:59:24.154000 audit: PATH item=0 name=(null) inode=5749 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=1 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=2 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=3 name=(null) inode=10093 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=4 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=5 name=(null) inode=10094 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=6 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=7 name=(null) inode=10095 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=8 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=9 name=(null) inode=10096 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=10 name=(null) inode=10092 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PATH item=11 name=(null) inode=10097 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 18:59:24.154000 audit: PROCTITLE proctitle="(udev-worker)" Feb 9 18:59:24.076258 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1208) Feb 9 18:59:24.095889 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 9 18:59:24.101699 systemd[1]: Finished systemd-udev-settle.service. Feb 9 18:59:24.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.107770 systemd[1]: Starting lvm2-activation-early.service... Feb 9 18:59:24.108159 systemd-networkd[1219]: lo: Link UP Feb 9 18:59:24.108163 systemd-networkd[1219]: lo: Gained carrier Feb 9 18:59:24.108577 systemd-networkd[1219]: Enumeration completed Feb 9 18:59:24.111968 systemd[1]: Started systemd-networkd.service. Feb 9 18:59:24.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.117282 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:59:24.132816 systemd-networkd[1219]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:59:24.179219 kernel: mlx5_core 08a4:00:02.0 enP2212s1: Link up Feb 9 18:59:24.205228 kernel: hv_netvsc 002248b9-1900-0022-48b9-1900002248b9 eth0: Data path switched to VF: enP2212s1 Feb 9 18:59:24.206628 systemd-networkd[1219]: enP2212s1: Link UP Feb 9 18:59:24.207061 systemd-networkd[1219]: eth0: Link UP Feb 9 18:59:24.207124 systemd-networkd[1219]: eth0: Gained carrier Feb 9 18:59:24.214748 systemd-networkd[1219]: enP2212s1: Gained carrier Feb 9 18:59:24.222338 systemd-networkd[1219]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:59:24.463136 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:59:24.505172 systemd[1]: Finished lvm2-activation-early.service. Feb 9 18:59:24.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.510072 systemd[1]: Reached target cryptsetup.target. Feb 9 18:59:24.515640 systemd[1]: Starting lvm2-activation.service... Feb 9 18:59:24.519826 lvm[1280]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 9 18:59:24.540185 systemd[1]: Finished lvm2-activation.service. Feb 9 18:59:24.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:24.544829 systemd[1]: Reached target local-fs-pre.target. Feb 9 18:59:24.549486 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 9 18:59:24.549518 systemd[1]: Reached target local-fs.target. Feb 9 18:59:24.553930 systemd[1]: Reached target machines.target. Feb 9 18:59:24.559483 systemd[1]: Starting ldconfig.service... Feb 9 18:59:24.563530 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 9 18:59:24.563601 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:59:24.564665 systemd[1]: Starting systemd-boot-update.service... Feb 9 18:59:24.569535 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 9 18:59:24.575824 systemd[1]: Starting systemd-machine-id-commit.service... Feb 9 18:59:24.580153 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:59:24.580245 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 9 18:59:24.581322 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 9 18:59:24.604653 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 9 18:59:24.637503 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1282 (bootctl) Feb 9 18:59:24.638803 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 9 18:59:25.033372 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 9 18:59:25.036053 systemd-tmpfiles[1285]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 9 18:59:25.085221 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 9 18:59:25.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:25.398852 systemd-fsck[1290]: fsck.fat 4.2 (2021-01-31) Feb 9 18:59:25.398852 systemd-fsck[1290]: /dev/sda1: 236 files, 113719/258078 clusters Feb 9 18:59:25.400490 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 9 18:59:25.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:25.407769 systemd[1]: Mounting boot.mount... Feb 9 18:59:25.441752 systemd[1]: Mounted boot.mount. Feb 9 18:59:25.451698 systemd[1]: Finished systemd-boot-update.service. Feb 9 18:59:25.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:25.535816 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 9 18:59:25.536414 systemd[1]: Finished systemd-machine-id-commit.service. Feb 9 18:59:25.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:25.708378 systemd-networkd[1219]: eth0: Gained IPv6LL Feb 9 18:59:25.713200 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:59:25.718000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.110039 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 9 18:59:26.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.116195 systemd[1]: Starting audit-rules.service... Feb 9 18:59:26.120611 systemd[1]: Starting clean-ca-certificates.service... Feb 9 18:59:26.125610 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 9 18:59:26.130000 audit: BPF prog-id=30 op=LOAD Feb 9 18:59:26.131874 systemd[1]: Starting systemd-resolved.service... Feb 9 18:59:26.136000 audit: BPF prog-id=31 op=LOAD Feb 9 18:59:26.137083 systemd[1]: Starting systemd-timesyncd.service... Feb 9 18:59:26.142009 systemd[1]: Starting systemd-update-utmp.service... Feb 9 18:59:26.185000 systemd[1]: Finished clean-ca-certificates.service. Feb 9 18:59:26.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.190400 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 9 18:59:26.232000 audit[1302]: SYSTEM_BOOT pid=1302 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.235480 systemd[1]: Finished systemd-update-utmp.service. Feb 9 18:59:26.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.240182 systemd[1]: Started systemd-timesyncd.service. Feb 9 18:59:26.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.244927 systemd[1]: Reached target time-set.target. Feb 9 18:59:26.267771 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 9 18:59:26.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.290323 systemd-resolved[1300]: Positive Trust Anchors: Feb 9 18:59:26.290608 systemd-resolved[1300]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 9 18:59:26.290689 systemd-resolved[1300]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 9 18:59:26.360579 systemd-resolved[1300]: Using system hostname 'ci-3510.3.2-a-c004c0b513'. Feb 9 18:59:26.362608 systemd[1]: Started systemd-resolved.service. Feb 9 18:59:26.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 18:59:26.367023 systemd[1]: Reached target network.target. Feb 9 18:59:26.371174 systemd[1]: Reached target network-online.target. Feb 9 18:59:26.375712 systemd[1]: Reached target nss-lookup.target. Feb 9 18:59:26.549484 systemd-timesyncd[1301]: Contacted time server 154.16.245.246:123 (0.flatcar.pool.ntp.org). Feb 9 18:59:26.549554 systemd-timesyncd[1301]: Initial clock synchronization to Fri 2024-02-09 18:59:26.549832 UTC. Feb 9 18:59:26.567000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:59:26.571522 kernel: kauditd_printk_skb: 94 callbacks suppressed Feb 9 18:59:26.571588 kernel: audit: type=1305 audit(1707505166.567:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 9 18:59:26.571816 augenrules[1317]: No rules Feb 9 18:59:26.581274 systemd[1]: Finished audit-rules.service. Feb 9 18:59:26.567000 audit[1317]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd79ca870 a2=420 a3=0 items=0 ppid=1296 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.606858 kernel: audit: type=1300 audit(1707505166.567:178): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd79ca870 a2=420 a3=0 items=0 ppid=1296 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 18:59:26.567000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:59:26.616359 kernel: audit: type=1327 audit(1707505166.567:178): proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 9 18:59:32.266745 ldconfig[1281]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 9 18:59:32.303314 systemd[1]: Finished ldconfig.service. Feb 9 18:59:32.309349 systemd[1]: Starting systemd-update-done.service... Feb 9 18:59:32.340438 systemd[1]: Finished systemd-update-done.service. Feb 9 18:59:32.345108 systemd[1]: Reached target sysinit.target. Feb 9 18:59:32.349342 systemd[1]: Started motdgen.path. Feb 9 18:59:32.353381 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 9 18:59:32.360124 systemd[1]: Started logrotate.timer. Feb 9 18:59:32.364110 systemd[1]: Started mdadm.timer. Feb 9 18:59:32.368153 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 9 18:59:32.372874 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 9 18:59:32.372909 systemd[1]: Reached target paths.target. Feb 9 18:59:32.377119 systemd[1]: Reached target timers.target. Feb 9 18:59:32.381486 systemd[1]: Listening on dbus.socket. Feb 9 18:59:32.386284 systemd[1]: Starting docker.socket... Feb 9 18:59:32.403816 systemd[1]: Listening on sshd.socket. Feb 9 18:59:32.408014 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:59:32.408482 systemd[1]: Listening on docker.socket. Feb 9 18:59:32.412405 systemd[1]: Reached target sockets.target. Feb 9 18:59:32.416683 systemd[1]: Reached target basic.target. Feb 9 18:59:32.420896 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:59:32.420925 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 9 18:59:32.421907 systemd[1]: Starting containerd.service... Feb 9 18:59:32.426329 systemd[1]: Starting dbus.service... Feb 9 18:59:32.430713 systemd[1]: Starting enable-oem-cloudinit.service... Feb 9 18:59:32.436114 systemd[1]: Starting extend-filesystems.service... Feb 9 18:59:32.443122 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 9 18:59:32.444122 systemd[1]: Starting motdgen.service... Feb 9 18:59:32.448590 systemd[1]: Started nvidia.service. Feb 9 18:59:32.453434 systemd[1]: Starting prepare-cni-plugins.service... Feb 9 18:59:32.459158 systemd[1]: Starting prepare-critools.service... Feb 9 18:59:32.464156 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 9 18:59:32.470448 systemd[1]: Starting sshd-keygen.service... Feb 9 18:59:32.476037 systemd[1]: Starting systemd-logind.service... Feb 9 18:59:32.480111 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 9 18:59:32.480179 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 9 18:59:32.480530 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 9 18:59:32.481764 systemd[1]: Starting update-engine.service... Feb 9 18:59:32.488388 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 9 18:59:32.497645 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 9 18:59:32.497857 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 9 18:59:32.504048 jq[1346]: true Feb 9 18:59:32.505500 jq[1327]: false Feb 9 18:59:32.521464 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 9 18:59:32.521625 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda1 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda2 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda3 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found usr Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda4 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda6 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda7 Feb 9 18:59:32.574920 extend-filesystems[1328]: Found sda9 Feb 9 18:59:32.574920 extend-filesystems[1328]: Checking size of /dev/sda9 Feb 9 18:59:32.608332 systemd[1]: motdgen.service: Deactivated successfully. Feb 9 18:59:32.608507 systemd[1]: Finished motdgen.service. Feb 9 18:59:32.627011 jq[1353]: true Feb 9 18:59:32.629591 systemd-logind[1341]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 9 18:59:32.629751 systemd-logind[1341]: New seat seat0. Feb 9 18:59:32.645587 tar[1348]: ./ Feb 9 18:59:32.645587 tar[1348]: ./macvlan Feb 9 18:59:32.648702 tar[1349]: crictl Feb 9 18:59:32.684990 tar[1348]: ./static Feb 9 18:59:32.706720 extend-filesystems[1328]: Old size kept for /dev/sda9 Feb 9 18:59:32.706720 extend-filesystems[1328]: Found sr0 Feb 9 18:59:32.711736 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 9 18:59:32.726486 env[1357]: time="2024-02-09T18:59:32.708656033Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 9 18:59:32.711896 systemd[1]: Finished extend-filesystems.service. Feb 9 18:59:32.746799 tar[1348]: ./vlan Feb 9 18:59:32.793754 env[1357]: time="2024-02-09T18:59:32.793671616Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 9 18:59:32.799282 env[1357]: time="2024-02-09T18:59:32.793843540Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801009 env[1357]: time="2024-02-09T18:59:32.800943248Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801009 env[1357]: time="2024-02-09T18:59:32.800998130Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801296 env[1357]: time="2024-02-09T18:59:32.801268895Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801296 env[1357]: time="2024-02-09T18:59:32.801293536Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801378 env[1357]: time="2024-02-09T18:59:32.801307776Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 9 18:59:32.801378 env[1357]: time="2024-02-09T18:59:32.801317456Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801415 env[1357]: time="2024-02-09T18:59:32.801391538Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801617 env[1357]: time="2024-02-09T18:59:32.801590022Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801754 env[1357]: time="2024-02-09T18:59:32.801727905Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 9 18:59:32.801754 env[1357]: time="2024-02-09T18:59:32.801750065Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 9 18:59:32.801812 env[1357]: time="2024-02-09T18:59:32.801802506Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 9 18:59:32.801837 env[1357]: time="2024-02-09T18:59:32.801814107Z" level=info msg="metadata content store policy set" policy=shared Feb 9 18:59:32.821015 systemd[1]: nvidia.service: Deactivated successfully. Feb 9 18:59:32.835242 tar[1348]: ./portmap Feb 9 18:59:32.876302 env[1357]: time="2024-02-09T18:59:32.876245227Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 9 18:59:32.876302 env[1357]: time="2024-02-09T18:59:32.876304029Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 9 18:59:32.876428 env[1357]: time="2024-02-09T18:59:32.876319469Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 9 18:59:32.876452 env[1357]: time="2024-02-09T18:59:32.876431791Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876475 env[1357]: time="2024-02-09T18:59:32.876456152Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876497 env[1357]: time="2024-02-09T18:59:32.876472152Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876497 env[1357]: time="2024-02-09T18:59:32.876486632Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876849 env[1357]: time="2024-02-09T18:59:32.876824079Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876888 env[1357]: time="2024-02-09T18:59:32.876851280Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876888 env[1357]: time="2024-02-09T18:59:32.876867840Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876888 env[1357]: time="2024-02-09T18:59:32.876880481Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.876948 env[1357]: time="2024-02-09T18:59:32.876894361Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 9 18:59:32.877025 env[1357]: time="2024-02-09T18:59:32.877002603Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 9 18:59:32.877102 env[1357]: time="2024-02-09T18:59:32.877082005Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 9 18:59:32.877348 env[1357]: time="2024-02-09T18:59:32.877323970Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 9 18:59:32.877385 env[1357]: time="2024-02-09T18:59:32.877365091Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877385 env[1357]: time="2024-02-09T18:59:32.877379251Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 9 18:59:32.877436 env[1357]: time="2024-02-09T18:59:32.877421012Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877458 env[1357]: time="2024-02-09T18:59:32.877434532Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877458 env[1357]: time="2024-02-09T18:59:32.877446852Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877502 env[1357]: time="2024-02-09T18:59:32.877457653Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877502 env[1357]: time="2024-02-09T18:59:32.877469573Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877502 env[1357]: time="2024-02-09T18:59:32.877482373Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877502 env[1357]: time="2024-02-09T18:59:32.877493493Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877574 env[1357]: time="2024-02-09T18:59:32.877504534Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877574 env[1357]: time="2024-02-09T18:59:32.877517894Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 9 18:59:32.877655 env[1357]: time="2024-02-09T18:59:32.877628496Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877687 env[1357]: time="2024-02-09T18:59:32.877660857Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877687 env[1357]: time="2024-02-09T18:59:32.877675337Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.877733 env[1357]: time="2024-02-09T18:59:32.877687858Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 9 18:59:32.877733 env[1357]: time="2024-02-09T18:59:32.877703058Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 9 18:59:32.877733 env[1357]: time="2024-02-09T18:59:32.877716298Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 9 18:59:32.877787 env[1357]: time="2024-02-09T18:59:32.877732978Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 9 18:59:32.877787 env[1357]: time="2024-02-09T18:59:32.877782660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 9 18:59:32.878026 env[1357]: time="2024-02-09T18:59:32.877974744Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.878031345Z" level=info msg="Connect containerd service" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.878067425Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.878820601Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.879034286Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.879068766Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.879113967Z" level=info msg="containerd successfully booted in 0.178489s" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886658806Z" level=info msg="Start subscribing containerd event" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886863890Z" level=info msg="Start recovering state" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886927771Z" level=info msg="Start event monitor" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886948972Z" level=info msg="Start snapshots syncer" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886959532Z" level=info msg="Start cni network conf syncer for default" Feb 9 18:59:32.891371 env[1357]: time="2024-02-09T18:59:32.886970212Z" level=info msg="Start streaming server" Feb 9 18:59:32.879185 systemd[1]: Started containerd.service. Feb 9 18:59:32.892784 bash[1393]: Updated "/home/core/.ssh/authorized_keys" Feb 9 18:59:32.893602 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 9 18:59:32.933515 tar[1348]: ./host-local Feb 9 18:59:32.977092 tar[1348]: ./vrf Feb 9 18:59:33.004815 dbus-daemon[1326]: [system] SELinux support is enabled Feb 9 18:59:33.004984 systemd[1]: Started dbus.service. Feb 9 18:59:33.010358 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 9 18:59:33.010886 dbus-daemon[1326]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 9 18:59:33.010387 systemd[1]: Reached target system-config.target. Feb 9 18:59:33.017294 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 9 18:59:33.017319 systemd[1]: Reached target user-config.target. Feb 9 18:59:33.024306 systemd[1]: Started systemd-logind.service. Feb 9 18:59:33.051191 tar[1348]: ./bridge Feb 9 18:59:33.107904 tar[1348]: ./tuning Feb 9 18:59:33.159467 tar[1348]: ./firewall Feb 9 18:59:33.217025 tar[1348]: ./host-device Feb 9 18:59:33.239608 systemd[1]: Finished prepare-critools.service. Feb 9 18:59:33.256321 tar[1348]: ./sbr Feb 9 18:59:33.284385 tar[1348]: ./loopback Feb 9 18:59:33.298667 update_engine[1344]: I0209 18:59:33.287264 1344 main.cc:92] Flatcar Update Engine starting Feb 9 18:59:33.312954 tar[1348]: ./dhcp Feb 9 18:59:33.387708 tar[1348]: ./ptp Feb 9 18:59:33.420004 tar[1348]: ./ipvlan Feb 9 18:59:33.452297 tar[1348]: ./bandwidth Feb 9 18:59:33.457371 systemd[1]: Started update-engine.service. Feb 9 18:59:33.457723 update_engine[1344]: I0209 18:59:33.457414 1344 update_check_scheduler.cc:74] Next update check in 3m44s Feb 9 18:59:33.463485 systemd[1]: Started locksmithd.service. Feb 9 18:59:33.539894 systemd[1]: Finished prepare-cni-plugins.service. Feb 9 18:59:33.975817 sshd_keygen[1345]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 9 18:59:33.992299 systemd[1]: Finished sshd-keygen.service. Feb 9 18:59:33.998163 systemd[1]: Starting issuegen.service... Feb 9 18:59:34.002806 systemd[1]: Started waagent.service. Feb 9 18:59:34.007495 systemd[1]: issuegen.service: Deactivated successfully. Feb 9 18:59:34.007652 systemd[1]: Finished issuegen.service. Feb 9 18:59:34.013026 systemd[1]: Starting systemd-user-sessions.service... Feb 9 18:59:34.057704 systemd[1]: Finished systemd-user-sessions.service. Feb 9 18:59:34.064908 systemd[1]: Started getty@tty1.service. Feb 9 18:59:34.071084 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 9 18:59:34.076116 systemd[1]: Reached target getty.target. Feb 9 18:59:34.080244 systemd[1]: Reached target multi-user.target. Feb 9 18:59:34.086066 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 9 18:59:34.093609 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 9 18:59:34.093768 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 9 18:59:34.099103 systemd[1]: Startup finished in 703ms (kernel) + 14.963s (initrd) + 21.875s (userspace) = 37.541s. Feb 9 18:59:34.588078 locksmithd[1432]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 9 18:59:34.735835 login[1452]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 9 18:59:34.737445 login[1453]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:59:34.793289 systemd[1]: Created slice user-500.slice. Feb 9 18:59:34.794427 systemd[1]: Starting user-runtime-dir@500.service... Feb 9 18:59:34.796417 systemd-logind[1341]: New session 2 of user core. Feb 9 18:59:34.844399 systemd[1]: Finished user-runtime-dir@500.service. Feb 9 18:59:34.845832 systemd[1]: Starting user@500.service... Feb 9 18:59:34.865467 (systemd)[1456]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 9 18:59:35.055179 systemd[1456]: Queued start job for default target default.target. Feb 9 18:59:35.055664 systemd[1456]: Reached target paths.target. Feb 9 18:59:35.055684 systemd[1456]: Reached target sockets.target. Feb 9 18:59:35.055695 systemd[1456]: Reached target timers.target. Feb 9 18:59:35.055705 systemd[1456]: Reached target basic.target. Feb 9 18:59:35.055744 systemd[1456]: Reached target default.target. Feb 9 18:59:35.055768 systemd[1456]: Startup finished in 184ms. Feb 9 18:59:35.055812 systemd[1]: Started user@500.service. Feb 9 18:59:35.056727 systemd[1]: Started session-2.scope. Feb 9 18:59:35.736235 login[1452]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 9 18:59:35.740173 systemd-logind[1341]: New session 1 of user core. Feb 9 18:59:35.740600 systemd[1]: Started session-1.scope. Feb 9 18:59:39.525016 waagent[1450]: 2024-02-09T18:59:39.524902Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 9 18:59:39.563625 waagent[1450]: 2024-02-09T18:59:39.563535Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 9 18:59:39.568528 waagent[1450]: 2024-02-09T18:59:39.568461Z INFO Daemon Daemon Python: 3.9.16 Feb 9 18:59:39.573471 waagent[1450]: 2024-02-09T18:59:39.573376Z INFO Daemon Daemon Run daemon Feb 9 18:59:39.577999 waagent[1450]: 2024-02-09T18:59:39.577939Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 9 18:59:39.594361 waagent[1450]: 2024-02-09T18:59:39.594253Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:59:39.609121 waagent[1450]: 2024-02-09T18:59:39.609011Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:59:39.618772 waagent[1450]: 2024-02-09T18:59:39.618707Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:59:39.623926 waagent[1450]: 2024-02-09T18:59:39.623864Z INFO Daemon Daemon Using waagent for provisioning Feb 9 18:59:39.629711 waagent[1450]: 2024-02-09T18:59:39.629653Z INFO Daemon Daemon Activate resource disk Feb 9 18:59:39.634549 waagent[1450]: 2024-02-09T18:59:39.634491Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 9 18:59:39.648786 waagent[1450]: 2024-02-09T18:59:39.648722Z INFO Daemon Daemon Found device: None Feb 9 18:59:39.653693 waagent[1450]: 2024-02-09T18:59:39.653627Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 9 18:59:39.662186 waagent[1450]: 2024-02-09T18:59:39.662112Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 9 18:59:39.674526 waagent[1450]: 2024-02-09T18:59:39.674459Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:59:39.680388 waagent[1450]: 2024-02-09T18:59:39.680322Z INFO Daemon Daemon Running default provisioning handler Feb 9 18:59:39.693698 waagent[1450]: 2024-02-09T18:59:39.693567Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 9 18:59:39.710305 waagent[1450]: 2024-02-09T18:59:39.710118Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 9 18:59:39.721243 waagent[1450]: 2024-02-09T18:59:39.721147Z INFO Daemon Daemon cloud-init is enabled: False Feb 9 18:59:39.726645 waagent[1450]: 2024-02-09T18:59:39.726569Z INFO Daemon Daemon Copying ovf-env.xml Feb 9 18:59:39.747630 waagent[1450]: 2024-02-09T18:59:39.747516Z INFO Daemon Daemon Successfully mounted dvd Feb 9 18:59:39.864917 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 9 18:59:39.883736 waagent[1450]: 2024-02-09T18:59:39.883592Z INFO Daemon Daemon Detect protocol endpoint Feb 9 18:59:39.888969 waagent[1450]: 2024-02-09T18:59:39.888892Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 9 18:59:39.894777 waagent[1450]: 2024-02-09T18:59:39.894716Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 9 18:59:39.901261 waagent[1450]: 2024-02-09T18:59:39.901185Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 9 18:59:39.907444 waagent[1450]: 2024-02-09T18:59:39.907385Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 9 18:59:39.912444 waagent[1450]: 2024-02-09T18:59:39.912388Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 9 18:59:40.102469 waagent[1450]: 2024-02-09T18:59:40.102403Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 9 18:59:40.109449 waagent[1450]: 2024-02-09T18:59:40.109407Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 9 18:59:40.114784 waagent[1450]: 2024-02-09T18:59:40.114728Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 9 18:59:41.027288 waagent[1450]: 2024-02-09T18:59:41.027116Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 9 18:59:41.042534 waagent[1450]: 2024-02-09T18:59:41.042465Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 9 18:59:41.048141 waagent[1450]: 2024-02-09T18:59:41.048081Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 9 18:59:41.121688 waagent[1450]: 2024-02-09T18:59:41.121551Z INFO Daemon Daemon Found private key matching thumbprint 8469489074C328AEAF7060B1CE5E3448188A81FA Feb 9 18:59:41.129942 waagent[1450]: 2024-02-09T18:59:41.129868Z INFO Daemon Daemon Certificate with thumbprint 60C41BF7B17CD8C14ED656BD6716FE9E954C2A14 has no matching private key. Feb 9 18:59:41.139305 waagent[1450]: 2024-02-09T18:59:41.139235Z INFO Daemon Daemon Fetch goal state completed Feb 9 18:59:41.185786 waagent[1450]: 2024-02-09T18:59:41.185730Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: aab73b06-e0ca-4046-b404-1ff2f18faddc New eTag: 17870305750372288116] Feb 9 18:59:41.196335 waagent[1450]: 2024-02-09T18:59:41.196263Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:59:41.211765 waagent[1450]: 2024-02-09T18:59:41.211697Z INFO Daemon Daemon Starting provisioning Feb 9 18:59:41.217745 waagent[1450]: 2024-02-09T18:59:41.217659Z INFO Daemon Daemon Handle ovf-env.xml. Feb 9 18:59:41.222683 waagent[1450]: 2024-02-09T18:59:41.222617Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-c004c0b513] Feb 9 18:59:41.254091 waagent[1450]: 2024-02-09T18:59:41.253958Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-c004c0b513] Feb 9 18:59:41.260404 waagent[1450]: 2024-02-09T18:59:41.260324Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 9 18:59:41.266829 waagent[1450]: 2024-02-09T18:59:41.266767Z INFO Daemon Daemon Primary interface is [eth0] Feb 9 18:59:41.282416 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 9 18:59:41.282581 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 9 18:59:41.282637 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 9 18:59:41.282873 systemd[1]: Stopping systemd-networkd.service... Feb 9 18:59:41.296245 systemd-networkd[1219]: eth0: DHCPv6 lease lost Feb 9 18:59:41.297835 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 9 18:59:41.298014 systemd[1]: Stopped systemd-networkd.service. Feb 9 18:59:41.299986 systemd[1]: Starting systemd-networkd.service... Feb 9 18:59:41.326196 systemd-networkd[1499]: enP2212s1: Link UP Feb 9 18:59:41.326213 systemd-networkd[1499]: enP2212s1: Gained carrier Feb 9 18:59:41.327073 systemd-networkd[1499]: eth0: Link UP Feb 9 18:59:41.327084 systemd-networkd[1499]: eth0: Gained carrier Feb 9 18:59:41.327421 systemd-networkd[1499]: lo: Link UP Feb 9 18:59:41.327430 systemd-networkd[1499]: lo: Gained carrier Feb 9 18:59:41.327656 systemd-networkd[1499]: eth0: Gained IPv6LL Feb 9 18:59:41.328064 systemd-networkd[1499]: Enumeration completed Feb 9 18:59:41.328172 systemd[1]: Started systemd-networkd.service. Feb 9 18:59:41.329849 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 9 18:59:41.331102 systemd-networkd[1499]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 9 18:59:41.332432 waagent[1450]: 2024-02-09T18:59:41.332258Z INFO Daemon Daemon Create user account if not exists Feb 9 18:59:41.338347 waagent[1450]: 2024-02-09T18:59:41.338271Z INFO Daemon Daemon User core already exists, skip useradd Feb 9 18:59:41.346567 waagent[1450]: 2024-02-09T18:59:41.346489Z INFO Daemon Daemon Configure sudoer Feb 9 18:59:41.351860 waagent[1450]: 2024-02-09T18:59:41.351795Z INFO Daemon Daemon Configure sshd Feb 9 18:59:41.356083 waagent[1450]: 2024-02-09T18:59:41.356021Z INFO Daemon Daemon Deploy ssh public key. Feb 9 18:59:41.361297 systemd-networkd[1499]: eth0: DHCPv4 address 10.200.20.10/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 9 18:59:41.363928 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 9 18:59:41.407245 waagent[1450]: 2024-02-09T18:59:41.407097Z INFO Daemon Daemon Decode custom data Feb 9 18:59:41.411804 waagent[1450]: 2024-02-09T18:59:41.411739Z INFO Daemon Daemon Save custom data Feb 9 18:59:42.575891 waagent[1450]: 2024-02-09T18:59:42.575821Z INFO Daemon Daemon Provisioning complete Feb 9 18:59:42.593763 waagent[1450]: 2024-02-09T18:59:42.593700Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 9 18:59:42.600071 waagent[1450]: 2024-02-09T18:59:42.600007Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 9 18:59:42.612509 waagent[1450]: 2024-02-09T18:59:42.612433Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 9 18:59:42.912894 waagent[1508]: 2024-02-09T18:59:42.912802Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 9 18:59:42.913667 waagent[1508]: 2024-02-09T18:59:42.913607Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:42.913802 waagent[1508]: 2024-02-09T18:59:42.913755Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:42.925991 waagent[1508]: 2024-02-09T18:59:42.925923Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 9 18:59:42.926169 waagent[1508]: 2024-02-09T18:59:42.926119Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 9 18:59:42.991996 waagent[1508]: 2024-02-09T18:59:42.991854Z INFO ExtHandler ExtHandler Found private key matching thumbprint 8469489074C328AEAF7060B1CE5E3448188A81FA Feb 9 18:59:42.992229 waagent[1508]: 2024-02-09T18:59:42.992156Z INFO ExtHandler ExtHandler Certificate with thumbprint 60C41BF7B17CD8C14ED656BD6716FE9E954C2A14 has no matching private key. Feb 9 18:59:42.992466 waagent[1508]: 2024-02-09T18:59:42.992414Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 9 18:59:43.005450 waagent[1508]: 2024-02-09T18:59:43.005395Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b8b076cb-6e8f-47fa-9c42-314fbd29b60d New eTag: 17870305750372288116] Feb 9 18:59:43.009620 waagent[1508]: 2024-02-09T18:59:43.009558Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 9 18:59:43.068024 waagent[1508]: 2024-02-09T18:59:43.067877Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:59:43.078143 waagent[1508]: 2024-02-09T18:59:43.078064Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1508 Feb 9 18:59:43.081922 waagent[1508]: 2024-02-09T18:59:43.081855Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:59:43.083289 waagent[1508]: 2024-02-09T18:59:43.083234Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:59:43.208262 waagent[1508]: 2024-02-09T18:59:43.208132Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:59:43.208628 waagent[1508]: 2024-02-09T18:59:43.208563Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:59:43.216028 waagent[1508]: 2024-02-09T18:59:43.215959Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:59:43.216555 waagent[1508]: 2024-02-09T18:59:43.216498Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:59:43.217710 waagent[1508]: 2024-02-09T18:59:43.217644Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 9 18:59:43.219232 waagent[1508]: 2024-02-09T18:59:43.219131Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:59:43.220073 waagent[1508]: 2024-02-09T18:59:43.220006Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:43.220393 waagent[1508]: 2024-02-09T18:59:43.220338Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:43.221055 waagent[1508]: 2024-02-09T18:59:43.220999Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:59:43.221469 waagent[1508]: 2024-02-09T18:59:43.221412Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:59:43.221469 waagent[1508]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:59:43.221469 waagent[1508]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:59:43.221469 waagent[1508]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:59:43.221469 waagent[1508]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:43.221469 waagent[1508]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:43.221469 waagent[1508]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:43.223833 waagent[1508]: 2024-02-09T18:59:43.223663Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:59:43.224678 waagent[1508]: 2024-02-09T18:59:43.224605Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:43.224863 waagent[1508]: 2024-02-09T18:59:43.224808Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:43.225464 waagent[1508]: 2024-02-09T18:59:43.225396Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:59:43.225678 waagent[1508]: 2024-02-09T18:59:43.225604Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:59:43.225928 waagent[1508]: 2024-02-09T18:59:43.225855Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:59:43.226011 waagent[1508]: 2024-02-09T18:59:43.225958Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:59:43.226270 waagent[1508]: 2024-02-09T18:59:43.226182Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:59:43.227046 waagent[1508]: 2024-02-09T18:59:43.226900Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:59:43.227236 waagent[1508]: 2024-02-09T18:59:43.227145Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:59:43.229820 waagent[1508]: 2024-02-09T18:59:43.229755Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:59:43.237764 waagent[1508]: 2024-02-09T18:59:43.237690Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 9 18:59:43.239829 waagent[1508]: 2024-02-09T18:59:43.239766Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:59:43.242648 waagent[1508]: 2024-02-09T18:59:43.242588Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 9 18:59:43.264553 waagent[1508]: 2024-02-09T18:59:43.264456Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1499' Feb 9 18:59:43.292851 waagent[1508]: 2024-02-09T18:59:43.292786Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 9 18:59:43.345720 waagent[1508]: 2024-02-09T18:59:43.345592Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:59:43.345720 waagent[1508]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:59:43.345720 waagent[1508]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:59:43.345720 waagent[1508]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b9:19:00 brd ff:ff:ff:ff:ff:ff Feb 9 18:59:43.345720 waagent[1508]: 3: enP2212s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b9:19:00 brd ff:ff:ff:ff:ff:ff\ altname enP2212p0s2 Feb 9 18:59:43.345720 waagent[1508]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:59:43.345720 waagent[1508]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:59:43.345720 waagent[1508]: 2: eth0 inet 10.200.20.10/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:59:43.345720 waagent[1508]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:59:43.345720 waagent[1508]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:59:43.345720 waagent[1508]: 2: eth0 inet6 fe80::222:48ff:feb9:1900/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:59:43.470147 waagent[1508]: 2024-02-09T18:59:43.470049Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 9 18:59:43.615531 waagent[1450]: 2024-02-09T18:59:43.615418Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 9 18:59:43.619408 waagent[1450]: 2024-02-09T18:59:43.619354Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 9 18:59:44.760132 waagent[1537]: 2024-02-09T18:59:44.760034Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 9 18:59:44.760814 waagent[1537]: 2024-02-09T18:59:44.760747Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 9 18:59:44.760939 waagent[1537]: 2024-02-09T18:59:44.760892Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 9 18:59:44.768471 waagent[1537]: 2024-02-09T18:59:44.768364Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 9 18:59:44.768858 waagent[1537]: 2024-02-09T18:59:44.768800Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:44.769000 waagent[1537]: 2024-02-09T18:59:44.768953Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:44.781376 waagent[1537]: 2024-02-09T18:59:44.781309Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 9 18:59:44.789725 waagent[1537]: 2024-02-09T18:59:44.789670Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 9 18:59:44.790692 waagent[1537]: 2024-02-09T18:59:44.790635Z INFO ExtHandler Feb 9 18:59:44.790837 waagent[1537]: 2024-02-09T18:59:44.790790Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 861f5d71-7985-43a0-8ca4-d4ee1e086de7 eTag: 17870305750372288116 source: Fabric] Feb 9 18:59:44.791577 waagent[1537]: 2024-02-09T18:59:44.791520Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 9 18:59:44.792787 waagent[1537]: 2024-02-09T18:59:44.792726Z INFO ExtHandler Feb 9 18:59:44.792919 waagent[1537]: 2024-02-09T18:59:44.792873Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 9 18:59:44.804437 waagent[1537]: 2024-02-09T18:59:44.804390Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 9 18:59:44.804889 waagent[1537]: 2024-02-09T18:59:44.804837Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 9 18:59:44.828087 waagent[1537]: 2024-02-09T18:59:44.828036Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 9 18:59:44.898032 waagent[1537]: 2024-02-09T18:59:44.897887Z INFO ExtHandler Downloaded certificate {'thumbprint': '8469489074C328AEAF7060B1CE5E3448188A81FA', 'hasPrivateKey': True} Feb 9 18:59:44.899066 waagent[1537]: 2024-02-09T18:59:44.899006Z INFO ExtHandler Downloaded certificate {'thumbprint': '60C41BF7B17CD8C14ED656BD6716FE9E954C2A14', 'hasPrivateKey': False} Feb 9 18:59:44.900112 waagent[1537]: 2024-02-09T18:59:44.900053Z INFO ExtHandler Fetch goal state completed Feb 9 18:59:44.921704 waagent[1537]: 2024-02-09T18:59:44.921635Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1537 Feb 9 18:59:44.925158 waagent[1537]: 2024-02-09T18:59:44.925097Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 9 18:59:44.926663 waagent[1537]: 2024-02-09T18:59:44.926606Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 9 18:59:44.931475 waagent[1537]: 2024-02-09T18:59:44.931417Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 9 18:59:44.931877 waagent[1537]: 2024-02-09T18:59:44.931817Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 9 18:59:44.939346 waagent[1537]: 2024-02-09T18:59:44.939288Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 9 18:59:44.939968 waagent[1537]: 2024-02-09T18:59:44.939914Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 9 18:59:44.945712 waagent[1537]: 2024-02-09T18:59:44.945610Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 9 18:59:44.949465 waagent[1537]: 2024-02-09T18:59:44.949408Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 9 18:59:44.951081 waagent[1537]: 2024-02-09T18:59:44.951014Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 9 18:59:44.951388 waagent[1537]: 2024-02-09T18:59:44.951314Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:44.952128 waagent[1537]: 2024-02-09T18:59:44.952054Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:44.952805 waagent[1537]: 2024-02-09T18:59:44.952734Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 9 18:59:44.953123 waagent[1537]: 2024-02-09T18:59:44.953064Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 9 18:59:44.953123 waagent[1537]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 9 18:59:44.953123 waagent[1537]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 9 18:59:44.953123 waagent[1537]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 9 18:59:44.953123 waagent[1537]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:44.953123 waagent[1537]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:44.953123 waagent[1537]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 9 18:59:44.955401 waagent[1537]: 2024-02-09T18:59:44.955282Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 9 18:59:44.955658 waagent[1537]: 2024-02-09T18:59:44.955579Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 9 18:59:44.956075 waagent[1537]: 2024-02-09T18:59:44.955991Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 9 18:59:44.956878 waagent[1537]: 2024-02-09T18:59:44.956804Z INFO EnvHandler ExtHandler Configure routes Feb 9 18:59:44.957019 waagent[1537]: 2024-02-09T18:59:44.956970Z INFO EnvHandler ExtHandler Gateway:None Feb 9 18:59:44.957134 waagent[1537]: 2024-02-09T18:59:44.957092Z INFO EnvHandler ExtHandler Routes:None Feb 9 18:59:44.957598 waagent[1537]: 2024-02-09T18:59:44.957525Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 9 18:59:44.957918 waagent[1537]: 2024-02-09T18:59:44.957852Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 9 18:59:44.960922 waagent[1537]: 2024-02-09T18:59:44.960780Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 9 18:59:44.961129 waagent[1537]: 2024-02-09T18:59:44.961058Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 9 18:59:44.963975 waagent[1537]: 2024-02-09T18:59:44.963808Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 9 18:59:44.982979 waagent[1537]: 2024-02-09T18:59:44.982912Z INFO MonitorHandler ExtHandler Network interfaces: Feb 9 18:59:44.982979 waagent[1537]: Executing ['ip', '-a', '-o', 'link']: Feb 9 18:59:44.982979 waagent[1537]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 9 18:59:44.982979 waagent[1537]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b9:19:00 brd ff:ff:ff:ff:ff:ff Feb 9 18:59:44.982979 waagent[1537]: 3: enP2212s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b9:19:00 brd ff:ff:ff:ff:ff:ff\ altname enP2212p0s2 Feb 9 18:59:44.982979 waagent[1537]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 9 18:59:44.982979 waagent[1537]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 9 18:59:44.982979 waagent[1537]: 2: eth0 inet 10.200.20.10/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 9 18:59:44.982979 waagent[1537]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 9 18:59:44.982979 waagent[1537]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 9 18:59:44.982979 waagent[1537]: 2: eth0 inet6 fe80::222:48ff:feb9:1900/64 scope link \ valid_lft forever preferred_lft forever Feb 9 18:59:44.985239 waagent[1537]: 2024-02-09T18:59:44.985101Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 9 18:59:44.988487 waagent[1537]: 2024-02-09T18:59:44.988389Z INFO ExtHandler ExtHandler Downloading manifest Feb 9 18:59:45.052102 waagent[1537]: 2024-02-09T18:59:45.051995Z INFO ExtHandler ExtHandler Feb 9 18:59:45.052445 waagent[1537]: 2024-02-09T18:59:45.052386Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 00a99f2d-1d0d-4640-9279-5dadcb04fdd1 correlation 83997a30-aa20-40db-b600-2ebc02204568 created: 2024-02-09T18:58:19.807907Z] Feb 9 18:59:45.058492 waagent[1537]: 2024-02-09T18:59:45.058398Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 9 18:59:45.064813 waagent[1537]: 2024-02-09T18:59:45.064651Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 12 ms] Feb 9 18:59:45.099655 waagent[1537]: 2024-02-09T18:59:45.099578Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 9 18:59:45.121692 waagent[1537]: 2024-02-09T18:59:45.121312Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 6239D2C2-DDC2-473D-BE14-4FE4ADA782F6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 9 18:59:45.174196 waagent[1537]: 2024-02-09T18:59:45.174044Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 9 18:59:45.174196 waagent[1537]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.174196 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.174196 waagent[1537]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.174196 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.174196 waagent[1537]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.174196 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.174196 waagent[1537]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:59:45.174196 waagent[1537]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:59:45.174196 waagent[1537]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:59:45.182409 waagent[1537]: 2024-02-09T18:59:45.182272Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 9 18:59:45.182409 waagent[1537]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.182409 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.182409 waagent[1537]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.182409 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.182409 waagent[1537]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 9 18:59:45.182409 waagent[1537]: pkts bytes target prot opt in out source destination Feb 9 18:59:45.182409 waagent[1537]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 9 18:59:45.182409 waagent[1537]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 9 18:59:45.182409 waagent[1537]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 9 18:59:45.182974 waagent[1537]: 2024-02-09T18:59:45.182914Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 9 19:00:11.967474 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 9 19:00:18.580606 update_engine[1344]: I0209 19:00:18.580250 1344 update_attempter.cc:509] Updating boot flags... Feb 9 19:00:26.816711 systemd[1]: Created slice system-sshd.slice. Feb 9 19:00:26.817913 systemd[1]: Started sshd@0-10.200.20.10:22-10.200.12.6:33798.service. Feb 9 19:00:27.398563 sshd[1629]: Accepted publickey for core from 10.200.12.6 port 33798 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:27.411615 sshd[1629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:27.416152 systemd[1]: Started session-3.scope. Feb 9 19:00:27.416456 systemd-logind[1341]: New session 3 of user core. Feb 9 19:00:27.775016 systemd[1]: Started sshd@1-10.200.20.10:22-10.200.12.6:43962.service. Feb 9 19:00:28.177973 sshd[1634]: Accepted publickey for core from 10.200.12.6 port 43962 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:28.179335 sshd[1634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:28.183063 systemd-logind[1341]: New session 4 of user core. Feb 9 19:00:28.183530 systemd[1]: Started session-4.scope. Feb 9 19:00:28.470438 sshd[1634]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:28.473347 systemd[1]: sshd@1-10.200.20.10:22-10.200.12.6:43962.service: Deactivated successfully. Feb 9 19:00:28.474069 systemd[1]: session-4.scope: Deactivated successfully. Feb 9 19:00:28.474557 systemd-logind[1341]: Session 4 logged out. Waiting for processes to exit. Feb 9 19:00:28.475198 systemd-logind[1341]: Removed session 4. Feb 9 19:00:28.537492 systemd[1]: Started sshd@2-10.200.20.10:22-10.200.12.6:43972.service. Feb 9 19:00:28.940533 sshd[1640]: Accepted publickey for core from 10.200.12.6 port 43972 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:28.942068 sshd[1640]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:28.946135 systemd[1]: Started session-5.scope. Feb 9 19:00:28.947172 systemd-logind[1341]: New session 5 of user core. Feb 9 19:00:29.229581 sshd[1640]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:29.232265 systemd[1]: sshd@2-10.200.20.10:22-10.200.12.6:43972.service: Deactivated successfully. Feb 9 19:00:29.232925 systemd[1]: session-5.scope: Deactivated successfully. Feb 9 19:00:29.233445 systemd-logind[1341]: Session 5 logged out. Waiting for processes to exit. Feb 9 19:00:29.234249 systemd-logind[1341]: Removed session 5. Feb 9 19:00:29.303597 systemd[1]: Started sshd@3-10.200.20.10:22-10.200.12.6:43978.service. Feb 9 19:00:29.737964 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 43978 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:29.739189 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:29.743300 systemd[1]: Started session-6.scope. Feb 9 19:00:29.743596 systemd-logind[1341]: New session 6 of user core. Feb 9 19:00:30.051777 sshd[1646]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:30.054333 systemd[1]: sshd@3-10.200.20.10:22-10.200.12.6:43978.service: Deactivated successfully. Feb 9 19:00:30.054973 systemd[1]: session-6.scope: Deactivated successfully. Feb 9 19:00:30.055520 systemd-logind[1341]: Session 6 logged out. Waiting for processes to exit. Feb 9 19:00:30.056297 systemd-logind[1341]: Removed session 6. Feb 9 19:00:30.118233 systemd[1]: Started sshd@4-10.200.20.10:22-10.200.12.6:43992.service. Feb 9 19:00:30.520410 sshd[1652]: Accepted publickey for core from 10.200.12.6 port 43992 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:30.521946 sshd[1652]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:30.526027 systemd[1]: Started session-7.scope. Feb 9 19:00:30.526674 systemd-logind[1341]: New session 7 of user core. Feb 9 19:00:30.990548 sudo[1655]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 9 19:00:30.990744 sudo[1655]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:00:31.013398 dbus-daemon[1326]: avc: received setenforce notice (enforcing=1) Feb 9 19:00:31.015178 sudo[1655]: pam_unix(sudo:session): session closed for user root Feb 9 19:00:31.091128 sshd[1652]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:31.093889 systemd[1]: sshd@4-10.200.20.10:22-10.200.12.6:43992.service: Deactivated successfully. Feb 9 19:00:31.094658 systemd[1]: session-7.scope: Deactivated successfully. Feb 9 19:00:31.095166 systemd-logind[1341]: Session 7 logged out. Waiting for processes to exit. Feb 9 19:00:31.095919 systemd-logind[1341]: Removed session 7. Feb 9 19:00:31.163235 systemd[1]: Started sshd@5-10.200.20.10:22-10.200.12.6:44004.service. Feb 9 19:00:31.598158 sshd[1659]: Accepted publickey for core from 10.200.12.6 port 44004 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:31.599461 sshd[1659]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:31.603608 systemd[1]: Started session-8.scope. Feb 9 19:00:31.603899 systemd-logind[1341]: New session 8 of user core. Feb 9 19:00:31.843648 sudo[1663]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 9 19:00:31.843842 sudo[1663]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:00:31.847778 sudo[1663]: pam_unix(sudo:session): session closed for user root Feb 9 19:00:31.851756 sudo[1662]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 9 19:00:31.851934 sudo[1662]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:00:31.860135 systemd[1]: Stopping audit-rules.service... Feb 9 19:00:31.860000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:00:31.871692 auditctl[1666]: No rules Feb 9 19:00:31.860000 audit[1666]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37d5e60 a2=420 a3=0 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:31.894015 kernel: audit: type=1305 audit(1707505231.860:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 9 19:00:31.894111 kernel: audit: type=1300 audit(1707505231.860:179): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe37d5e60 a2=420 a3=0 items=0 ppid=1 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:31.872294 systemd[1]: audit-rules.service: Deactivated successfully. Feb 9 19:00:31.872470 systemd[1]: Stopped audit-rules.service. Feb 9 19:00:31.893996 systemd[1]: Starting audit-rules.service... Feb 9 19:00:31.860000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:00:31.902068 kernel: audit: type=1327 audit(1707505231.860:179): proctitle=2F7362696E2F617564697463746C002D44 Feb 9 19:00:31.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.917830 augenrules[1683]: No rules Feb 9 19:00:31.913994 sudo[1662]: pam_unix(sudo:session): session closed for user root Feb 9 19:00:31.912969 systemd[1]: Finished audit-rules.service. Feb 9 19:00:31.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.933219 kernel: audit: type=1131 audit(1707505231.871:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.933301 kernel: audit: type=1130 audit(1707505231.911:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.912000 audit[1662]: USER_END pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.950801 kernel: audit: type=1106 audit(1707505231.912:182): pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.950884 kernel: audit: type=1104 audit(1707505231.912:183): pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.912000 audit[1662]: CRED_DISP pid=1662 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.985420 sshd[1659]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:31.986000 audit[1659]: USER_END pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:31.987925 systemd[1]: sshd@5-10.200.20.10:22-10.200.12.6:44004.service: Deactivated successfully. Feb 9 19:00:31.988637 systemd[1]: session-8.scope: Deactivated successfully. Feb 9 19:00:31.989724 systemd-logind[1341]: Session 8 logged out. Waiting for processes to exit. Feb 9 19:00:31.990556 systemd-logind[1341]: Removed session 8. Feb 9 19:00:31.986000 audit[1659]: CRED_DISP pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.030216 kernel: audit: type=1106 audit(1707505231.986:184): pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.030301 kernel: audit: type=1104 audit(1707505231.986:185): pid=1659 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.030345 kernel: audit: type=1131 audit(1707505231.987:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.10:22-10.200.12.6:44004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:31.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.10:22-10.200.12.6:44004 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:32.053500 systemd[1]: Started sshd@6-10.200.20.10:22-10.200.12.6:44012.service. Feb 9 19:00:32.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.10:22-10.200.12.6:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:32.460000 audit[1689]: USER_ACCT pid=1689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.461123 sshd[1689]: Accepted publickey for core from 10.200.12.6 port 44012 ssh2: RSA SHA256:JVlDsuBKxXKGvQQfqsvB6oVLyN00DMylLYJ1bqVqejo Feb 9 19:00:32.462000 audit[1689]: CRED_ACQ pid=1689 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.462000 audit[1689]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc832e650 a2=3 a3=1 items=0 ppid=1 pid=1689 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:32.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 9 19:00:32.462677 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 9 19:00:32.466698 systemd[1]: Started session-9.scope. Feb 9 19:00:32.467217 systemd-logind[1341]: New session 9 of user core. Feb 9 19:00:32.470000 audit[1689]: USER_START pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.472000 audit[1691]: CRED_ACQ pid=1691 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:32.692000 audit[1692]: USER_ACCT pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:32.692000 audit[1692]: CRED_REFR pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:32.693875 sudo[1692]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 9 19:00:32.694069 sudo[1692]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 9 19:00:32.694000 audit[1692]: USER_START pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:33.359708 systemd[1]: Reloading. Feb 9 19:00:33.425358 /usr/lib/systemd/system-generators/torcx-generator[1722]: time="2024-02-09T19:00:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:00:33.429633 /usr/lib/systemd/system-generators/torcx-generator[1722]: time="2024-02-09T19:00:33Z" level=info msg="torcx already run" Feb 9 19:00:33.486817 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:00:33.486836 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:00:33.503870 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.567000 audit: BPF prog-id=38 op=LOAD Feb 9 19:00:33.567000 audit: BPF prog-id=35 op=UNLOAD Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit: BPF prog-id=39 op=LOAD Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.568000 audit: BPF prog-id=40 op=LOAD Feb 9 19:00:33.568000 audit: BPF prog-id=24 op=UNLOAD Feb 9 19:00:33.568000 audit: BPF prog-id=25 op=UNLOAD Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.569000 audit: BPF prog-id=41 op=LOAD Feb 9 19:00:33.569000 audit: BPF prog-id=30 op=UNLOAD Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit: BPF prog-id=42 op=LOAD Feb 9 19:00:33.570000 audit: BPF prog-id=27 op=UNLOAD Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit: BPF prog-id=43 op=LOAD Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.570000 audit: BPF prog-id=44 op=LOAD Feb 9 19:00:33.570000 audit: BPF prog-id=28 op=UNLOAD Feb 9 19:00:33.570000 audit: BPF prog-id=29 op=UNLOAD Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit: BPF prog-id=45 op=LOAD Feb 9 19:00:33.571000 audit: BPF prog-id=32 op=UNLOAD Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit: BPF prog-id=46 op=LOAD Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.571000 audit: BPF prog-id=47 op=LOAD Feb 9 19:00:33.571000 audit: BPF prog-id=33 op=UNLOAD Feb 9 19:00:33.571000 audit: BPF prog-id=34 op=UNLOAD Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.572000 audit: BPF prog-id=48 op=LOAD Feb 9 19:00:33.572000 audit: BPF prog-id=31 op=UNLOAD Feb 9 19:00:33.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.573000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.573000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit: BPF prog-id=49 op=LOAD Feb 9 19:00:33.574000 audit: BPF prog-id=21 op=UNLOAD Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit: BPF prog-id=50 op=LOAD Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.574000 audit: BPF prog-id=51 op=LOAD Feb 9 19:00:33.574000 audit: BPF prog-id=22 op=UNLOAD Feb 9 19:00:33.574000 audit: BPF prog-id=23 op=UNLOAD Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:33.575000 audit: BPF prog-id=52 op=LOAD Feb 9 19:00:33.575000 audit: BPF prog-id=37 op=UNLOAD Feb 9 19:00:33.590944 systemd[1]: Started kubelet.service. Feb 9 19:00:33.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:33.601741 systemd[1]: Starting coreos-metadata.service... Feb 9 19:00:33.641477 coreos-metadata[1787]: Feb 09 19:00:33.641 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 9 19:00:33.644086 coreos-metadata[1787]: Feb 09 19:00:33.644 INFO Fetch successful Feb 9 19:00:33.644086 coreos-metadata[1787]: Feb 09 19:00:33.644 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 9 19:00:33.646037 coreos-metadata[1787]: Feb 09 19:00:33.646 INFO Fetch successful Feb 9 19:00:33.646037 coreos-metadata[1787]: Feb 09 19:00:33.646 INFO Fetching http://168.63.129.16/machine/27dff444-7d5d-4c2b-9fe3-450e6b541a77/3c106af4%2Db3b8%2D43c7%2Da068%2D21337b6a56ba.%5Fci%2D3510.3.2%2Da%2Dc004c0b513?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 9 19:00:33.647898 coreos-metadata[1787]: Feb 09 19:00:33.647 INFO Fetch successful Feb 9 19:00:33.657371 kubelet[1780]: E0209 19:00:33.657309 1780 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 9 19:00:33.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 9 19:00:33.660334 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 9 19:00:33.660455 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 9 19:00:33.681684 coreos-metadata[1787]: Feb 09 19:00:33.681 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 9 19:00:33.692242 coreos-metadata[1787]: Feb 09 19:00:33.692 INFO Fetch successful Feb 9 19:00:33.700677 systemd[1]: Finished coreos-metadata.service. Feb 9 19:00:33.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:36.618187 systemd[1]: Stopped kubelet.service. Feb 9 19:00:36.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:36.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:36.632173 systemd[1]: Reloading. Feb 9 19:00:36.693194 /usr/lib/systemd/system-generators/torcx-generator[1844]: time="2024-02-09T19:00:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 9 19:00:36.693261 /usr/lib/systemd/system-generators/torcx-generator[1844]: time="2024-02-09T19:00:36Z" level=info msg="torcx already run" Feb 9 19:00:36.756183 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 9 19:00:36.756229 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 9 19:00:36.773072 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.833000 audit: BPF prog-id=53 op=LOAD Feb 9 19:00:36.833000 audit: BPF prog-id=38 op=UNLOAD Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit: BPF prog-id=54 op=LOAD Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.834000 audit: BPF prog-id=55 op=LOAD Feb 9 19:00:36.834000 audit: BPF prog-id=39 op=UNLOAD Feb 9 19:00:36.834000 audit: BPF prog-id=40 op=UNLOAD Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.835000 audit: BPF prog-id=56 op=LOAD Feb 9 19:00:36.835000 audit: BPF prog-id=41 op=UNLOAD Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit: BPF prog-id=57 op=LOAD Feb 9 19:00:36.836000 audit: BPF prog-id=42 op=UNLOAD Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit: BPF prog-id=58 op=LOAD Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.836000 audit: BPF prog-id=59 op=LOAD Feb 9 19:00:36.836000 audit: BPF prog-id=43 op=UNLOAD Feb 9 19:00:36.836000 audit: BPF prog-id=44 op=UNLOAD Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit: BPF prog-id=60 op=LOAD Feb 9 19:00:36.837000 audit: BPF prog-id=45 op=UNLOAD Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit: BPF prog-id=61 op=LOAD Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.837000 audit: BPF prog-id=62 op=LOAD Feb 9 19:00:36.837000 audit: BPF prog-id=46 op=UNLOAD Feb 9 19:00:36.837000 audit: BPF prog-id=47 op=UNLOAD Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.838000 audit: BPF prog-id=63 op=LOAD Feb 9 19:00:36.838000 audit: BPF prog-id=48 op=UNLOAD Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit: BPF prog-id=64 op=LOAD Feb 9 19:00:36.840000 audit: BPF prog-id=49 op=UNLOAD Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit: BPF prog-id=65 op=LOAD Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.840000 audit: BPF prog-id=66 op=LOAD Feb 9 19:00:36.840000 audit: BPF prog-id=50 op=UNLOAD Feb 9 19:00:36.840000 audit: BPF prog-id=51 op=UNLOAD Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:36.841000 audit: BPF prog-id=67 op=LOAD Feb 9 19:00:36.841000 audit: BPF prog-id=52 op=UNLOAD Feb 9 19:00:36.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:36.853568 systemd[1]: Started kubelet.service. Feb 9 19:00:36.895133 kubelet[1905]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:00:36.895133 kubelet[1905]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:00:36.895133 kubelet[1905]: I0209 19:00:36.892726 1905 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 9 19:00:36.895453 kubelet[1905]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 9 19:00:36.895453 kubelet[1905]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 9 19:00:37.324240 kubelet[1905]: I0209 19:00:37.323968 1905 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 9 19:00:37.324419 kubelet[1905]: I0209 19:00:37.324408 1905 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 9 19:00:37.324683 kubelet[1905]: I0209 19:00:37.324669 1905 server.go:836] "Client rotation is on, will bootstrap in background" Feb 9 19:00:37.327004 kubelet[1905]: I0209 19:00:37.326966 1905 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 9 19:00:37.328701 kubelet[1905]: W0209 19:00:37.328681 1905 machine.go:65] Cannot read vendor id correctly, set empty. Feb 9 19:00:37.330449 kubelet[1905]: I0209 19:00:37.330418 1905 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 9 19:00:37.330752 kubelet[1905]: I0209 19:00:37.330739 1905 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 9 19:00:37.331166 kubelet[1905]: I0209 19:00:37.331150 1905 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 9 19:00:37.331347 kubelet[1905]: I0209 19:00:37.331334 1905 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 9 19:00:37.331423 kubelet[1905]: I0209 19:00:37.331414 1905 container_manager_linux.go:308] "Creating device plugin manager" Feb 9 19:00:37.331562 kubelet[1905]: I0209 19:00:37.331551 1905 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:00:37.334569 kubelet[1905]: I0209 19:00:37.334553 1905 kubelet.go:398] "Attempting to sync node with API server" Feb 9 19:00:37.334689 kubelet[1905]: I0209 19:00:37.334678 1905 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 9 19:00:37.334765 kubelet[1905]: I0209 19:00:37.334755 1905 kubelet.go:297] "Adding apiserver pod source" Feb 9 19:00:37.334819 kubelet[1905]: I0209 19:00:37.334810 1905 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 9 19:00:37.335422 kubelet[1905]: E0209 19:00:37.335391 1905 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:37.335488 kubelet[1905]: E0209 19:00:37.335440 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:37.335764 kubelet[1905]: I0209 19:00:37.335740 1905 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 9 19:00:37.336020 kubelet[1905]: W0209 19:00:37.336003 1905 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 9 19:00:37.336376 kubelet[1905]: I0209 19:00:37.336354 1905 server.go:1186] "Started kubelet" Feb 9 19:00:37.336865 kubelet[1905]: I0209 19:00:37.336845 1905 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 9 19:00:37.338227 kubelet[1905]: I0209 19:00:37.338191 1905 server.go:451] "Adding debug handlers to kubelet server" Feb 9 19:00:37.337000 audit[1905]: AVC avc: denied { mac_admin } for pid=1905 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:37.339265 kubelet[1905]: E0209 19:00:37.339248 1905 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 9 19:00:37.339364 kubelet[1905]: E0209 19:00:37.339354 1905 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 9 19:00:37.340273 kubelet[1905]: I0209 19:00:37.340259 1905 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 9 19:00:37.340405 kubelet[1905]: I0209 19:00:37.340394 1905 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 9 19:00:37.342579 kernel: kauditd_printk_skb: 361 callbacks suppressed Feb 9 19:00:37.342652 kernel: audit: type=1400 audit(1707505237.337:546): avc: denied { mac_admin } for pid=1905 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:37.344413 kubelet[1905]: I0209 19:00:37.344399 1905 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 9 19:00:37.344624 kubelet[1905]: I0209 19:00:37.344614 1905 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 9 19:00:37.344746 kubelet[1905]: I0209 19:00:37.344737 1905 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 9 19:00:37.337000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:00:37.361524 kubelet[1905]: E0209 19:00:37.361502 1905 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:37.361722 kubelet[1905]: E0209 19:00:37.361645 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7738d133a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 336331066, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 336331066, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.362021 kubelet[1905]: W0209 19:00:37.362005 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:37.362104 kubelet[1905]: E0209 19:00:37.362094 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:37.362199 kubelet[1905]: W0209 19:00:37.362188 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:37.362275 kubelet[1905]: E0209 19:00:37.362266 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:37.362373 kubelet[1905]: W0209 19:00:37.362362 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:37.362455 kubelet[1905]: E0209 19:00:37.362444 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:37.369287 kernel: audit: type=1401 audit(1707505237.337:546): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:00:37.337000 audit[1905]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d89d70 a1=4000d9cbe8 a2=4000d89d40 a3=25 items=0 ppid=1 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.376296 kubelet[1905]: E0209 19:00:37.376211 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f773baff5e", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 339340638, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 339340638, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.393359 kernel: audit: type=1300 audit(1707505237.337:546): arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d89d70 a1=4000d9cbe8 a2=4000d89d40 a3=25 items=0 ppid=1 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.337000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:00:37.401066 kubelet[1905]: I0209 19:00:37.401049 1905 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 9 19:00:37.401160 kubelet[1905]: I0209 19:00:37.401151 1905 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 9 19:00:37.401228 kubelet[1905]: I0209 19:00:37.401219 1905 state_mem.go:36] "Initialized new in-memory state store" Feb 9 19:00:37.410167 kubelet[1905]: E0209 19:00:37.410093 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.411148 kubelet[1905]: E0209 19:00:37.411094 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.411957 kubelet[1905]: E0209 19:00:37.411907 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.418695 kernel: audit: type=1327 audit(1707505237.337:546): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:00:37.337000 audit[1905]: AVC avc: denied { mac_admin } for pid=1905 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:37.436314 kernel: audit: type=1400 audit(1707505237.337:547): avc: denied { mac_admin } for pid=1905 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:37.337000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:00:37.446044 kernel: audit: type=1401 audit(1707505237.337:547): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:00:37.446097 kernel: audit: type=1300 audit(1707505237.337:547): arch=c00000b7 syscall=5 success=no exit=-22 a0=40000e3ba0 a1=4000d9cc00 a2=4000d89e00 a3=25 items=0 ppid=1 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.337000 audit[1905]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000e3ba0 a1=4000d9cc00 a2=4000d89e00 a3=25 items=0 ppid=1 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.446261 kubelet[1905]: I0209 19:00:37.445381 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:37.447108 kubelet[1905]: E0209 19:00:37.447080 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:37.448014 kubelet[1905]: E0209 19:00:37.447949 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 445344764, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.448829 kubelet[1905]: E0209 19:00:37.448766 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 445350122, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.449548 kubelet[1905]: E0209 19:00:37.449496 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 445353161, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.337000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:00:37.471840 kubelet[1905]: I0209 19:00:37.471822 1905 policy_none.go:49] "None policy: Start" Feb 9 19:00:37.472680 kubelet[1905]: I0209 19:00:37.472667 1905 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 9 19:00:37.472768 kubelet[1905]: I0209 19:00:37.472759 1905 state_mem.go:35] "Initializing new in-memory state store" Feb 9 19:00:37.495035 kernel: audit: type=1327 audit(1707505237.337:547): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:00:37.368000 audit[1916]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.508428 kernel: audit: type=1325 audit(1707505237.368:548): table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.508480 kernel: audit: type=1300 audit(1707505237.368:548): arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdebecd40 a2=0 a3=1 items=0 ppid=1905 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.368000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdebecd40 a2=0 a3=1 items=0 ppid=1905 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:00:37.368000 audit[1917]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.368000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd7aae5e0 a2=0 a3=1 items=0 ppid=1905 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:00:37.374000 audit[1919]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.374000 audit[1919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd2a7b1a0 a2=0 a3=1 items=0 ppid=1905 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.374000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:00:37.389000 audit[1922]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.389000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc86dee50 a2=0 a3=1 items=0 ppid=1905 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.389000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 9 19:00:37.539110 systemd[1]: Created slice kubepods.slice. Feb 9 19:00:37.541000 audit[1928]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.541000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd59cd9c0 a2=0 a3=1 items=0 ppid=1905 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 9 19:00:37.545163 systemd[1]: Created slice kubepods-burstable.slice. Feb 9 19:00:37.544000 audit[1929]: NETFILTER_CFG table=nat:10 family=2 entries=2 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.544000 audit[1929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffcf9f35f0 a2=0 a3=1 items=0 ppid=1905 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.544000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:00:37.548617 systemd[1]: Created slice kubepods-besteffort.slice. Feb 9 19:00:37.555803 kubelet[1905]: I0209 19:00:37.555774 1905 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 9 19:00:37.554000 audit[1905]: AVC avc: denied { mac_admin } for pid=1905 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:37.554000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 9 19:00:37.554000 audit[1905]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001100b70 a1=4000fe3470 a2=4001100b40 a3=25 items=0 ppid=1 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.554000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 9 19:00:37.556050 kubelet[1905]: I0209 19:00:37.555866 1905 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 9 19:00:37.556050 kubelet[1905]: I0209 19:00:37.556027 1905 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 9 19:00:37.558003 kubelet[1905]: E0209 19:00:37.557845 1905 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.10\" not found" Feb 9 19:00:37.559466 kubelet[1905]: E0209 19:00:37.559370 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f780c27e06", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 557935622, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 557935622, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.563379 kubelet[1905]: E0209 19:00:37.563346 1905 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:37.648291 kubelet[1905]: I0209 19:00:37.648269 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:37.649753 kubelet[1905]: E0209 19:00:37.649723 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:37.649880 kubelet[1905]: E0209 19:00:37.649692 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 648198779, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.650769 kubelet[1905]: E0209 19:00:37.650703 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 648234168, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.671000 audit[1932]: NETFILTER_CFG table=nat:11 family=2 entries=1 op=nft_register_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.671000 audit[1932]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffef24ee50 a2=0 a3=1 items=0 ppid=1905 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.671000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:00:37.696000 audit[1935]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.696000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc4d28090 a2=0 a3=1 items=0 ppid=1905 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:00:37.698000 audit[1936]: NETFILTER_CFG table=nat:13 family=2 entries=1 op=nft_register_chain pid=1936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.698000 audit[1936]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe70664d0 a2=0 a3=1 items=0 ppid=1905 pid=1936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.698000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:00:37.699000 audit[1937]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_chain pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.699000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb86c4e0 a2=0 a3=1 items=0 ppid=1905 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.699000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:00:37.701000 audit[1939]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_rule pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.701000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd48f5560 a2=0 a3=1 items=0 ppid=1905 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:00:37.737861 kubelet[1905]: E0209 19:00:37.737772 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 648237647, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:37.703000 audit[1941]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.703000 audit[1941]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc1f4a860 a2=0 a3=1 items=0 ppid=1905 pid=1941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:00:37.746000 audit[1944]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.746000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffe5cbfff0 a2=0 a3=1 items=0 ppid=1905 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:00:37.748000 audit[1946]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.748000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc490a810 a2=0 a3=1 items=0 ppid=1905 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.748000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:00:37.824000 audit[1949]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.824000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffc1de8c50 a2=0 a3=1 items=0 ppid=1905 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:00:37.825961 kubelet[1905]: I0209 19:00:37.825942 1905 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 9 19:00:37.825000 audit[1951]: NETFILTER_CFG table=mangle:20 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.825000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffebf397b0 a2=0 a3=1 items=0 ppid=1905 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.825000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:00:37.825000 audit[1950]: NETFILTER_CFG table=mangle:21 family=10 entries=2 op=nft_register_chain pid=1950 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.825000 audit[1950]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeb86d770 a2=0 a3=1 items=0 ppid=1905 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.825000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 9 19:00:37.826000 audit[1952]: NETFILTER_CFG table=nat:22 family=2 entries=1 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.826000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffaa5db90 a2=0 a3=1 items=0 ppid=1905 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.826000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:00:37.827000 audit[1953]: NETFILTER_CFG table=nat:23 family=10 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.827000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc40a9030 a2=0 a3=1 items=0 ppid=1905 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 9 19:00:37.828000 audit[1954]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_chain pid=1954 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:37.828000 audit[1954]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8e95870 a2=0 a3=1 items=0 ppid=1905 pid=1954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.828000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:00:37.829000 audit[1956]: NETFILTER_CFG table=nat:25 family=10 entries=1 op=nft_register_rule pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.829000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffffac37dd0 a2=0 a3=1 items=0 ppid=1905 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.829000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 9 19:00:37.831000 audit[1957]: NETFILTER_CFG table=filter:26 family=10 entries=2 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.831000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffedfce1e0 a2=0 a3=1 items=0 ppid=1905 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 9 19:00:37.833000 audit[1959]: NETFILTER_CFG table=filter:27 family=10 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.833000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc15b01f0 a2=0 a3=1 items=0 ppid=1905 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 9 19:00:37.834000 audit[1960]: NETFILTER_CFG table=nat:28 family=10 entries=1 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.834000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc75a0320 a2=0 a3=1 items=0 ppid=1905 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 9 19:00:37.835000 audit[1961]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.835000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd014a800 a2=0 a3=1 items=0 ppid=1905 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.835000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 9 19:00:37.837000 audit[1963]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.837000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc2ac6400 a2=0 a3=1 items=0 ppid=1905 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 9 19:00:37.838000 audit[1965]: NETFILTER_CFG table=nat:31 family=10 entries=2 op=nft_register_chain pid=1965 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.838000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffe01f040 a2=0 a3=1 items=0 ppid=1905 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.838000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 9 19:00:37.840000 audit[1967]: NETFILTER_CFG table=nat:32 family=10 entries=1 op=nft_register_rule pid=1967 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.840000 audit[1967]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=fffffd4ab630 a2=0 a3=1 items=0 ppid=1905 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 9 19:00:37.842000 audit[1969]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.842000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffff4ffba60 a2=0 a3=1 items=0 ppid=1905 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.842000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 9 19:00:37.868000 audit[1971]: NETFILTER_CFG table=nat:34 family=10 entries=1 op=nft_register_rule pid=1971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.868000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffff3c118b0 a2=0 a3=1 items=0 ppid=1905 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.868000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 9 19:00:37.869716 kubelet[1905]: I0209 19:00:37.869691 1905 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 9 19:00:37.869716 kubelet[1905]: I0209 19:00:37.869718 1905 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 9 19:00:37.869807 kubelet[1905]: I0209 19:00:37.869736 1905 kubelet.go:2113] "Starting kubelet main sync loop" Feb 9 19:00:37.869807 kubelet[1905]: E0209 19:00:37.869783 1905 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 9 19:00:37.869000 audit[1972]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.869000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6ab01e0 a2=0 a3=1 items=0 ppid=1905 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.869000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 9 19:00:37.871032 kubelet[1905]: W0209 19:00:37.871011 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:37.871095 kubelet[1905]: E0209 19:00:37.871038 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:37.870000 audit[1973]: NETFILTER_CFG table=nat:36 family=10 entries=1 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.870000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb67f1b0 a2=0 a3=1 items=0 ppid=1905 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.870000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 9 19:00:37.871000 audit[1974]: NETFILTER_CFG table=filter:37 family=10 entries=1 op=nft_register_chain pid=1974 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:37.871000 audit[1974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff3b72870 a2=0 a3=1 items=0 ppid=1905 pid=1974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:37.871000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 9 19:00:37.964478 kubelet[1905]: E0209 19:00:37.964394 1905 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:38.050639 kubelet[1905]: I0209 19:00:38.050611 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:38.051554 kubelet[1905]: E0209 19:00:38.051534 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:38.051807 kubelet[1905]: E0209 19:00:38.051734 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 50571715, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:38.138239 kubelet[1905]: E0209 19:00:38.138151 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 50583912, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:38.302897 kubelet[1905]: W0209 19:00:38.302794 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:38.302897 kubelet[1905]: E0209 19:00:38.302835 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:38.308713 kubelet[1905]: W0209 19:00:38.308689 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:38.308713 kubelet[1905]: E0209 19:00:38.308717 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:38.335976 kubelet[1905]: E0209 19:00:38.335958 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:38.337878 kubelet[1905]: E0209 19:00:38.337800 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 50587071, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:38.766735 kubelet[1905]: E0209 19:00:38.766702 1905 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:38.778021 kubelet[1905]: W0209 19:00:38.777996 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:38.778068 kubelet[1905]: E0209 19:00:38.778039 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:38.853326 kubelet[1905]: I0209 19:00:38.853302 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:38.854512 kubelet[1905]: E0209 19:00:38.854432 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 853267226, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:38.854880 kubelet[1905]: E0209 19:00:38.854865 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:38.855385 kubelet[1905]: E0209 19:00:38.855333 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 853273424, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:38.880580 kubelet[1905]: W0209 19:00:38.880548 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:38.880742 kubelet[1905]: E0209 19:00:38.880731 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:38.938092 kubelet[1905]: E0209 19:00:38.938001 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 38, 853276383, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:39.336586 kubelet[1905]: E0209 19:00:39.336552 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:40.337602 kubelet[1905]: E0209 19:00:40.337570 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:40.367577 kubelet[1905]: E0209 19:00:40.367552 1905 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:40.456621 kubelet[1905]: I0209 19:00:40.456604 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:40.457769 kubelet[1905]: E0209 19:00:40.457751 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:40.457957 kubelet[1905]: E0209 19:00:40.457873 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 40, 456568069, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:40.458839 kubelet[1905]: E0209 19:00:40.458786 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 40, 456573868, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:40.459648 kubelet[1905]: E0209 19:00:40.459598 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 40, 456579306, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:40.524791 kubelet[1905]: W0209 19:00:40.524771 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:40.524906 kubelet[1905]: E0209 19:00:40.524896 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:40.587398 kubelet[1905]: W0209 19:00:40.587375 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:40.587523 kubelet[1905]: E0209 19:00:40.587512 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:41.142524 kubelet[1905]: W0209 19:00:41.142490 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:41.142524 kubelet[1905]: E0209 19:00:41.142525 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:41.142906 kubelet[1905]: W0209 19:00:41.142886 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:41.142938 kubelet[1905]: E0209 19:00:41.142908 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:41.338890 kubelet[1905]: E0209 19:00:41.338871 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:42.339273 kubelet[1905]: E0209 19:00:42.339245 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:43.340409 kubelet[1905]: E0209 19:00:43.340373 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:43.569133 kubelet[1905]: E0209 19:00:43.569106 1905 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.20.10" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 9 19:00:43.659137 kubelet[1905]: I0209 19:00:43.659108 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:43.660664 kubelet[1905]: E0209 19:00:43.660643 1905 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.10" Feb 9 19:00:43.660790 kubelet[1905]: E0209 19:00:43.660647 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a6c35", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.10 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400120373, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 43, 659056378, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a6c35" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:43.661687 kubelet[1905]: E0209 19:00:43.661628 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a8353", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.10 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400126291, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 43, 659070694, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a8353" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:43.662492 kubelet[1905]: E0209 19:00:43.662420 1905 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10.17b246f7775a92a2", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.10", UID:"10.200.20.10", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.10 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.10"}, FirstTimestamp:time.Date(2024, time.February, 9, 19, 0, 37, 400130210, time.Local), LastTimestamp:time.Date(2024, time.February, 9, 19, 0, 43, 659073733, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.10.17b246f7775a92a2" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 9 19:00:44.340621 kubelet[1905]: E0209 19:00:44.340590 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:44.890663 kubelet[1905]: W0209 19:00:44.890634 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:44.890663 kubelet[1905]: E0209 19:00:44.890667 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.10" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 9 19:00:44.966883 kubelet[1905]: W0209 19:00:44.966851 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:44.966934 kubelet[1905]: E0209 19:00:44.966887 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 9 19:00:45.341378 kubelet[1905]: E0209 19:00:45.341275 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:45.375146 kubelet[1905]: W0209 19:00:45.375110 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:45.375146 kubelet[1905]: E0209 19:00:45.375148 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 9 19:00:45.485813 kubelet[1905]: W0209 19:00:45.485778 1905 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:45.485886 kubelet[1905]: E0209 19:00:45.485822 1905 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 9 19:00:46.341747 kubelet[1905]: E0209 19:00:46.341707 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:47.326242 kubelet[1905]: I0209 19:00:47.326169 1905 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 9 19:00:47.342746 kubelet[1905]: E0209 19:00:47.342719 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:47.558128 kubelet[1905]: E0209 19:00:47.558104 1905 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.10\" not found" Feb 9 19:00:47.722874 kubelet[1905]: E0209 19:00:47.722826 1905 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.10" not found Feb 9 19:00:48.342837 kubelet[1905]: E0209 19:00:48.342803 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:48.766066 kubelet[1905]: E0209 19:00:48.766038 1905 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.10" not found Feb 9 19:00:49.343579 kubelet[1905]: E0209 19:00:49.343534 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:49.973188 kubelet[1905]: E0209 19:00:49.973157 1905 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.10\" not found" node="10.200.20.10" Feb 9 19:00:50.063347 kubelet[1905]: I0209 19:00:50.063325 1905 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.10" Feb 9 19:00:50.167273 kubelet[1905]: I0209 19:00:50.167245 1905 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.10" Feb 9 19:00:50.178191 kubelet[1905]: E0209 19:00:50.178151 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.278808 kubelet[1905]: E0209 19:00:50.278720 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.344324 kubelet[1905]: E0209 19:00:50.344294 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:50.367314 sudo[1692]: pam_unix(sudo:session): session closed for user root Feb 9 19:00:50.367000 audit[1692]: USER_END pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.372854 kernel: kauditd_printk_skb: 101 callbacks suppressed Feb 9 19:00:50.372931 kernel: audit: type=1106 audit(1707505250.367:582): pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.379179 kubelet[1905]: E0209 19:00:50.379152 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.367000 audit[1692]: CRED_DISP pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.414060 kernel: audit: type=1104 audit(1707505250.367:583): pid=1692 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.435904 sshd[1689]: pam_unix(sshd:session): session closed for user core Feb 9 19:00:50.436000 audit[1689]: USER_END pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.462871 systemd[1]: sshd@6-10.200.20.10:22-10.200.12.6:44012.service: Deactivated successfully. Feb 9 19:00:50.436000 audit[1689]: CRED_DISP pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.463277 kernel: audit: type=1106 audit(1707505250.436:584): pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.463614 systemd[1]: session-9.scope: Deactivated successfully. Feb 9 19:00:50.484669 kubelet[1905]: E0209 19:00:50.484631 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.484891 systemd-logind[1341]: Session 9 logged out. Waiting for processes to exit. Feb 9 19:00:50.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.10:22-10.200.12.6:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.506919 kernel: audit: type=1104 audit(1707505250.436:585): pid=1689 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 9 19:00:50.507039 kernel: audit: type=1131 audit(1707505250.462:586): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.10:22-10.200.12.6:44012 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 9 19:00:50.507061 systemd-logind[1341]: Removed session 9. Feb 9 19:00:50.585478 kubelet[1905]: E0209 19:00:50.585383 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.685831 kubelet[1905]: E0209 19:00:50.685803 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.786079 kubelet[1905]: E0209 19:00:50.786048 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.886743 kubelet[1905]: E0209 19:00:50.886717 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:50.987044 kubelet[1905]: E0209 19:00:50.987013 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.087409 kubelet[1905]: E0209 19:00:51.087393 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.188014 kubelet[1905]: E0209 19:00:51.187711 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.288616 kubelet[1905]: E0209 19:00:51.288594 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.345157 kubelet[1905]: E0209 19:00:51.345136 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:51.389302 kubelet[1905]: E0209 19:00:51.389276 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.490059 kubelet[1905]: E0209 19:00:51.489690 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.590229 kubelet[1905]: E0209 19:00:51.590211 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.690638 kubelet[1905]: E0209 19:00:51.690613 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.791319 kubelet[1905]: E0209 19:00:51.791010 1905 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.10\" not found" Feb 9 19:00:51.892144 kubelet[1905]: I0209 19:00:51.892120 1905 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 9 19:00:51.892567 env[1357]: time="2024-02-09T19:00:51.892466784Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 9 19:00:51.892828 kubelet[1905]: I0209 19:00:51.892612 1905 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 9 19:00:52.342673 kubelet[1905]: I0209 19:00:52.342499 1905 apiserver.go:52] "Watching apiserver" Feb 9 19:00:52.344912 kubelet[1905]: I0209 19:00:52.344890 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:00:52.344980 kubelet[1905]: I0209 19:00:52.344962 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:00:52.345014 kubelet[1905]: I0209 19:00:52.344997 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:00:52.345529 kubelet[1905]: E0209 19:00:52.345474 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:52.346199 kubelet[1905]: E0209 19:00:52.345704 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:00:52.346486 kubelet[1905]: I0209 19:00:52.346465 1905 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 9 19:00:52.349796 systemd[1]: Created slice kubepods-besteffort-pod06e521df_a909_4e27_81f1_e52186a5a16e.slice. Feb 9 19:00:52.360935 systemd[1]: Created slice kubepods-besteffort-poda18f5911_c21a_4a50_9e4b_e6176758503e.slice. Feb 9 19:00:52.404278 kubelet[1905]: I0209 19:00:52.404252 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a18f5911-c21a-4a50-9e4b-e6176758503e-kube-proxy\") pod \"kube-proxy-d76dh\" (UID: \"a18f5911-c21a-4a50-9e4b-e6176758503e\") " pod="kube-system/kube-proxy-d76dh" Feb 9 19:00:52.404473 kubelet[1905]: I0209 19:00:52.404460 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a18f5911-c21a-4a50-9e4b-e6176758503e-lib-modules\") pod \"kube-proxy-d76dh\" (UID: \"a18f5911-c21a-4a50-9e4b-e6176758503e\") " pod="kube-system/kube-proxy-d76dh" Feb 9 19:00:52.404612 kubelet[1905]: I0209 19:00:52.404600 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-lib-modules\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.404710 kubelet[1905]: I0209 19:00:52.404700 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-policysync\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.404808 kubelet[1905]: I0209 19:00:52.404798 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/06e521df-a909-4e27-81f1-e52186a5a16e-tigera-ca-bundle\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.404903 kubelet[1905]: I0209 19:00:52.404893 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-var-run-calico\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405004 kubelet[1905]: I0209 19:00:52.404988 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-var-lib-calico\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405111 kubelet[1905]: I0209 19:00:52.405100 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjh9f\" (UniqueName: \"kubernetes.io/projected/7ca1d03f-54ad-4d21-90f1-86b69a28b6ee-kube-api-access-tjh9f\") pod \"csi-node-driver-6v5c6\" (UID: \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\") " pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:00:52.405217 kubelet[1905]: I0209 19:00:52.405193 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/06e521df-a909-4e27-81f1-e52186a5a16e-node-certs\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405315 kubelet[1905]: I0209 19:00:52.405305 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-cni-bin-dir\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405409 kubelet[1905]: I0209 19:00:52.405400 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-flexvol-driver-host\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405521 kubelet[1905]: I0209 19:00:52.405510 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w7tmz\" (UniqueName: \"kubernetes.io/projected/06e521df-a909-4e27-81f1-e52186a5a16e-kube-api-access-w7tmz\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405627 kubelet[1905]: I0209 19:00:52.405616 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-xtables-lock\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405720 kubelet[1905]: I0209 19:00:52.405711 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-cni-log-dir\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405830 kubelet[1905]: I0209 19:00:52.405810 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ph48x\" (UniqueName: \"kubernetes.io/projected/a18f5911-c21a-4a50-9e4b-e6176758503e-kube-api-access-ph48x\") pod \"kube-proxy-d76dh\" (UID: \"a18f5911-c21a-4a50-9e4b-e6176758503e\") " pod="kube-system/kube-proxy-d76dh" Feb 9 19:00:52.405879 kubelet[1905]: I0209 19:00:52.405850 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7ca1d03f-54ad-4d21-90f1-86b69a28b6ee-kubelet-dir\") pod \"csi-node-driver-6v5c6\" (UID: \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\") " pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:00:52.405905 kubelet[1905]: I0209 19:00:52.405880 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7ca1d03f-54ad-4d21-90f1-86b69a28b6ee-socket-dir\") pod \"csi-node-driver-6v5c6\" (UID: \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\") " pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:00:52.405933 kubelet[1905]: I0209 19:00:52.405905 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7ca1d03f-54ad-4d21-90f1-86b69a28b6ee-registration-dir\") pod \"csi-node-driver-6v5c6\" (UID: \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\") " pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:00:52.405933 kubelet[1905]: I0209 19:00:52.405924 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a18f5911-c21a-4a50-9e4b-e6176758503e-xtables-lock\") pod \"kube-proxy-d76dh\" (UID: \"a18f5911-c21a-4a50-9e4b-e6176758503e\") " pod="kube-system/kube-proxy-d76dh" Feb 9 19:00:52.405981 kubelet[1905]: I0209 19:00:52.405948 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/06e521df-a909-4e27-81f1-e52186a5a16e-cni-net-dir\") pod \"calico-node-szzb9\" (UID: \"06e521df-a909-4e27-81f1-e52186a5a16e\") " pod="calico-system/calico-node-szzb9" Feb 9 19:00:52.405981 kubelet[1905]: I0209 19:00:52.405967 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7ca1d03f-54ad-4d21-90f1-86b69a28b6ee-varrun\") pod \"csi-node-driver-6v5c6\" (UID: \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\") " pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:00:52.406029 kubelet[1905]: I0209 19:00:52.405983 1905 reconciler.go:41] "Reconciler: start to sync state" Feb 9 19:00:52.508865 kubelet[1905]: E0209 19:00:52.508831 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509029 kubelet[1905]: W0209 19:00:52.509014 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.509115 kubelet[1905]: E0209 19:00:52.509104 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.509334 kubelet[1905]: E0209 19:00:52.509313 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509334 kubelet[1905]: W0209 19:00:52.509330 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.509433 kubelet[1905]: E0209 19:00:52.509349 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.509489 kubelet[1905]: E0209 19:00:52.509472 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509489 kubelet[1905]: W0209 19:00:52.509484 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.509543 kubelet[1905]: E0209 19:00:52.509496 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.509625 kubelet[1905]: E0209 19:00:52.509607 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509625 kubelet[1905]: W0209 19:00:52.509619 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.509694 kubelet[1905]: E0209 19:00:52.509630 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.509779 kubelet[1905]: E0209 19:00:52.509764 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509779 kubelet[1905]: W0209 19:00:52.509775 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.509851 kubelet[1905]: E0209 19:00:52.509802 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.509994 kubelet[1905]: E0209 19:00:52.509976 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.509994 kubelet[1905]: W0209 19:00:52.509990 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.510068 kubelet[1905]: E0209 19:00:52.510002 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.510133 kubelet[1905]: E0209 19:00:52.510116 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.510133 kubelet[1905]: W0209 19:00:52.510128 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.510196 kubelet[1905]: E0209 19:00:52.510141 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.510329 kubelet[1905]: E0209 19:00:52.510310 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.510329 kubelet[1905]: W0209 19:00:52.510323 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.510396 kubelet[1905]: E0209 19:00:52.510333 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.517360 kubelet[1905]: E0209 19:00:52.517333 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.517360 kubelet[1905]: W0209 19:00:52.517352 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.517360 kubelet[1905]: E0209 19:00:52.517367 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.569072 kubelet[1905]: E0209 19:00:52.569048 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.569221 kubelet[1905]: W0209 19:00:52.569191 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.569285 kubelet[1905]: E0209 19:00:52.569275 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607507 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.609030 kubelet[1905]: W0209 19:00:52.607533 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607550 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607707 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.609030 kubelet[1905]: W0209 19:00:52.607715 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607726 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607877 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.609030 kubelet[1905]: W0209 19:00:52.607887 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.609030 kubelet[1905]: E0209 19:00:52.607897 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.709084 kubelet[1905]: E0209 19:00:52.709059 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.709084 kubelet[1905]: W0209 19:00:52.709078 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.713645 kubelet[1905]: E0209 19:00:52.709101 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.713645 kubelet[1905]: E0209 19:00:52.709410 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.713645 kubelet[1905]: W0209 19:00:52.709421 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.713645 kubelet[1905]: E0209 19:00:52.709435 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.713645 kubelet[1905]: E0209 19:00:52.709624 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.713645 kubelet[1905]: W0209 19:00:52.709632 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.713645 kubelet[1905]: E0209 19:00:52.709642 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.810436 kubelet[1905]: E0209 19:00:52.810412 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.810436 kubelet[1905]: W0209 19:00:52.810431 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.810571 kubelet[1905]: E0209 19:00:52.810449 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.810632 kubelet[1905]: E0209 19:00:52.810617 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.810632 kubelet[1905]: W0209 19:00:52.810630 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.810696 kubelet[1905]: E0209 19:00:52.810642 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.810805 kubelet[1905]: E0209 19:00:52.810791 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.810805 kubelet[1905]: W0209 19:00:52.810803 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.810858 kubelet[1905]: E0209 19:00:52.810814 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.911779 kubelet[1905]: E0209 19:00:52.911757 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.911941 kubelet[1905]: W0209 19:00:52.911926 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.912011 kubelet[1905]: E0209 19:00:52.912001 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.912237 kubelet[1905]: E0209 19:00:52.912225 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.912306 kubelet[1905]: W0209 19:00:52.912296 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.912384 kubelet[1905]: E0209 19:00:52.912374 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.912579 kubelet[1905]: E0209 19:00:52.912568 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.912652 kubelet[1905]: W0209 19:00:52.912641 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.912710 kubelet[1905]: E0209 19:00:52.912701 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:52.975101 kubelet[1905]: E0209 19:00:52.974995 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:52.975101 kubelet[1905]: W0209 19:00:52.975018 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:52.975101 kubelet[1905]: E0209 19:00:52.975037 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.013397 kubelet[1905]: E0209 19:00:53.013375 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.013546 kubelet[1905]: W0209 19:00:53.013533 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.013614 kubelet[1905]: E0209 19:00:53.013604 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.013830 kubelet[1905]: E0209 19:00:53.013819 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.013906 kubelet[1905]: W0209 19:00:53.013895 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.013965 kubelet[1905]: E0209 19:00:53.013955 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.114503 kubelet[1905]: E0209 19:00:53.114482 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.114650 kubelet[1905]: W0209 19:00:53.114636 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.114714 kubelet[1905]: E0209 19:00:53.114705 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.114932 kubelet[1905]: E0209 19:00:53.114921 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.115008 kubelet[1905]: W0209 19:00:53.114997 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.115072 kubelet[1905]: E0209 19:00:53.115062 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.176565 kubelet[1905]: E0209 19:00:53.176491 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.176565 kubelet[1905]: W0209 19:00:53.176508 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.176565 kubelet[1905]: E0209 19:00:53.176525 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.215969 kubelet[1905]: E0209 19:00:53.215947 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.215969 kubelet[1905]: W0209 19:00:53.215965 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.216086 kubelet[1905]: E0209 19:00:53.215983 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.260053 env[1357]: time="2024-02-09T19:00:53.260007617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-szzb9,Uid:06e521df-a909-4e27-81f1-e52186a5a16e,Namespace:calico-system,Attempt:0,}" Feb 9 19:00:53.317114 kubelet[1905]: E0209 19:00:53.317093 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.317276 kubelet[1905]: W0209 19:00:53.317261 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.317369 kubelet[1905]: E0209 19:00:53.317359 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.345622 kubelet[1905]: E0209 19:00:53.345590 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:53.377343 kubelet[1905]: E0209 19:00:53.377321 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:53.377494 kubelet[1905]: W0209 19:00:53.377479 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:53.377572 kubelet[1905]: E0209 19:00:53.377562 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:53.565944 env[1357]: time="2024-02-09T19:00:53.565845252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d76dh,Uid:a18f5911-c21a-4a50-9e4b-e6176758503e,Namespace:kube-system,Attempt:0,}" Feb 9 19:00:53.870552 kubelet[1905]: E0209 19:00:53.870186 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:00:54.346601 kubelet[1905]: E0209 19:00:54.346488 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:54.719551 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1466273520.mount: Deactivated successfully. Feb 9 19:00:54.789399 env[1357]: time="2024-02-09T19:00:54.789353035Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.802510 env[1357]: time="2024-02-09T19:00:54.802468991Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.837303 env[1357]: time="2024-02-09T19:00:54.837264255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.849908 env[1357]: time="2024-02-09T19:00:54.849864590Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.858913 env[1357]: time="2024-02-09T19:00:54.858870697Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.872169 env[1357]: time="2024-02-09T19:00:54.872128785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.881751 env[1357]: time="2024-02-09T19:00:54.881713101Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:54.894589 env[1357]: time="2024-02-09T19:00:54.894551430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:55.025763 env[1357]: time="2024-02-09T19:00:55.025620760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:00:55.025763 env[1357]: time="2024-02-09T19:00:55.025706104Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:00:55.025763 env[1357]: time="2024-02-09T19:00:55.025733498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:00:55.030670 env[1357]: time="2024-02-09T19:00:55.029472557Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23ad0b61564c9f287ed901a6091950a1ffb666f88960d7cf3103d4ba0e07a18d pid=2019 runtime=io.containerd.runc.v2 Feb 9 19:00:55.040221 env[1357]: time="2024-02-09T19:00:55.040118959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:00:55.040221 env[1357]: time="2024-02-09T19:00:55.040158351Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:00:55.040221 env[1357]: time="2024-02-09T19:00:55.040168349Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:00:55.040589 env[1357]: time="2024-02-09T19:00:55.040532761Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e pid=2044 runtime=io.containerd.runc.v2 Feb 9 19:00:55.045922 systemd[1]: Started cri-containerd-23ad0b61564c9f287ed901a6091950a1ffb666f88960d7cf3103d4ba0e07a18d.scope. Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.092329 kernel: audit: type=1400 audit(1707505255.057:587): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.092554 kernel: audit: type=1400 audit(1707505255.057:588): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.092588 kernel: audit: type=1400 audit(1707505255.057:589): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.125366 kernel: audit: type=1400 audit(1707505255.057:590): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.127107 systemd[1]: Started cri-containerd-c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e.scope. Feb 9 19:00:55.144250 kernel: audit: type=1400 audit(1707505255.057:591): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.057000 audit: BPF prog-id=68 op=LOAD Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2019 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616430623631353634633966323837656439303161363039313935 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2019 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616430623631353634633966323837656439303161363039313935 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.066000 audit: BPF prog-id=69 op=LOAD Feb 9 19:00:55.066000 audit[2036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2019 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616430623631353634633966323837656439303161363039313935 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.074000 audit: BPF prog-id=70 op=LOAD Feb 9 19:00:55.074000 audit[2036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2019 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616430623631353634633966323837656439303161363039313935 Feb 9 19:00:55.074000 audit: BPF prog-id=70 op=UNLOAD Feb 9 19:00:55.075000 audit: BPF prog-id=69 op=UNLOAD Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { perfmon } for pid=2036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit[2036]: AVC avc: denied { bpf } for pid=2036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.075000 audit: BPF prog-id=71 op=LOAD Feb 9 19:00:55.075000 audit[2036]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2019 pid=2036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233616430623631353634633966323837656439303161363039313935 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.154000 audit: BPF prog-id=72 op=LOAD Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2044 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616364316538626366343762316464333731623436643538653165 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2044 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616364316538626366343762316464333731623436643538653165 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.156000 audit: BPF prog-id=73 op=LOAD Feb 9 19:00:55.156000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2044 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616364316538626366343762316464333731623436643538653165 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.158000 audit: BPF prog-id=74 op=LOAD Feb 9 19:00:55.158000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2044 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616364316538626366343762316464333731623436643538653165 Feb 9 19:00:55.158000 audit: BPF prog-id=74 op=UNLOAD Feb 9 19:00:55.158000 audit: BPF prog-id=73 op=UNLOAD Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { perfmon } for pid=2058 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit[2058]: AVC avc: denied { bpf } for pid=2058 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:55.159000 audit: BPF prog-id=75 op=LOAD Feb 9 19:00:55.159000 audit[2058]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2044 pid=2058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:55.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330616364316538626366343762316464333731623436643538653165 Feb 9 19:00:55.164298 env[1357]: time="2024-02-09T19:00:55.163856857Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-d76dh,Uid:a18f5911-c21a-4a50-9e4b-e6176758503e,Namespace:kube-system,Attempt:0,} returns sandbox id \"23ad0b61564c9f287ed901a6091950a1ffb666f88960d7cf3103d4ba0e07a18d\"" Feb 9 19:00:55.166115 env[1357]: time="2024-02-09T19:00:55.166086798Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 9 19:00:55.172774 env[1357]: time="2024-02-09T19:00:55.172743989Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-szzb9,Uid:06e521df-a909-4e27-81f1-e52186a5a16e,Namespace:calico-system,Attempt:0,} returns sandbox id \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\"" Feb 9 19:00:55.349241 kubelet[1905]: E0209 19:00:55.347244 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:55.872015 kubelet[1905]: E0209 19:00:55.871981 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:00:56.348495 kubelet[1905]: E0209 19:00:56.348176 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:56.732893 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1678949056.mount: Deactivated successfully. Feb 9 19:00:57.232454 env[1357]: time="2024-02-09T19:00:57.232402416Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:57.251016 env[1357]: time="2024-02-09T19:00:57.250970860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:57.262128 env[1357]: time="2024-02-09T19:00:57.262094834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:57.270545 env[1357]: time="2024-02-09T19:00:57.270512690Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:57.271076 env[1357]: time="2024-02-09T19:00:57.271043316Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 9 19:00:57.272135 kubelet[1905]: E0209 19:00:57.272082 1905 kuberuntime_manager.go:872] container &Container{Name:kube-proxy,Image:registry.k8s.io/kube-proxy:v1.26.13,Command:[/usr/local/bin/kube-proxy --config=/var/lib/kube-proxy/config.conf --hostname-override=$(NODE_NAME)],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:NODE_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:spec.nodeName,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-proxy,ReadOnly:false,MountPath:/var/lib/kube-proxy,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:xtables-lock,ReadOnly:false,MountPath:/run/xtables.lock,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:lib-modules,ReadOnly:true,MountPath:/lib/modules,SubPath:,MountPropagation:nil,SubPathExpr:,},VolumeMount{Name:kube-api-access-ph48x,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:nil,Privileged:*true,SELinuxOptions:nil,RunAsUser:nil,RunAsNonRoot:nil,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:nil,RunAsGroup:nil,ProcMount:nil,WindowsOptions:nil,SeccompProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,} start failed in pod kube-proxy-d76dh_kube-system(a18f5911-c21a-4a50-9e4b-e6176758503e): CreateContainerConfigError: services have not yet been read at least once, cannot construct envvars Feb 9 19:00:57.272476 kubelet[1905]: E0209 19:00:57.272129 1905 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"kube-proxy\" with CreateContainerConfigError: \"services have not yet been read at least once, cannot construct envvars\"" pod="kube-system/kube-proxy-d76dh" podUID=a18f5911-c21a-4a50-9e4b-e6176758503e Feb 9 19:00:57.272510 env[1357]: time="2024-02-09T19:00:57.272425549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 9 19:00:57.335275 kubelet[1905]: E0209 19:00:57.335246 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:57.348733 kubelet[1905]: E0209 19:00:57.348701 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:57.871664 kubelet[1905]: E0209 19:00:57.870200 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:00:57.901846 env[1357]: time="2024-02-09T19:00:57.901798926Z" level=info msg="CreateContainer within sandbox \"23ad0b61564c9f287ed901a6091950a1ffb666f88960d7cf3103d4ba0e07a18d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 9 19:00:57.954917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3733111387.mount: Deactivated successfully. Feb 9 19:00:57.959369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2614137256.mount: Deactivated successfully. Feb 9 19:00:57.982728 kubelet[1905]: E0209 19:00:57.982699 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.982728 kubelet[1905]: W0209 19:00:57.982721 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.982888 kubelet[1905]: E0209 19:00:57.982740 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.982915 kubelet[1905]: E0209 19:00:57.982895 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.982915 kubelet[1905]: W0209 19:00:57.982902 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.982960 kubelet[1905]: E0209 19:00:57.982921 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983078 kubelet[1905]: E0209 19:00:57.983065 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983078 kubelet[1905]: W0209 19:00:57.983077 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983133 kubelet[1905]: E0209 19:00:57.983087 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983279 kubelet[1905]: E0209 19:00:57.983265 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983279 kubelet[1905]: W0209 19:00:57.983277 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983346 kubelet[1905]: E0209 19:00:57.983296 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983437 kubelet[1905]: E0209 19:00:57.983424 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983437 kubelet[1905]: W0209 19:00:57.983436 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983503 kubelet[1905]: E0209 19:00:57.983446 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983583 kubelet[1905]: E0209 19:00:57.983570 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983583 kubelet[1905]: W0209 19:00:57.983582 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983634 kubelet[1905]: E0209 19:00:57.983592 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983768 kubelet[1905]: E0209 19:00:57.983754 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983768 kubelet[1905]: W0209 19:00:57.983767 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983826 kubelet[1905]: E0209 19:00:57.983778 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.983926 kubelet[1905]: E0209 19:00:57.983911 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.983926 kubelet[1905]: W0209 19:00:57.983923 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.983990 kubelet[1905]: E0209 19:00:57.983934 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984070 kubelet[1905]: E0209 19:00:57.984050 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984070 kubelet[1905]: W0209 19:00:57.984068 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.984126 kubelet[1905]: E0209 19:00:57.984079 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984320 kubelet[1905]: E0209 19:00:57.984305 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984320 kubelet[1905]: W0209 19:00:57.984318 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.984408 kubelet[1905]: E0209 19:00:57.984330 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984486 kubelet[1905]: E0209 19:00:57.984469 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984486 kubelet[1905]: W0209 19:00:57.984481 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.984560 kubelet[1905]: E0209 19:00:57.984493 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984650 kubelet[1905]: E0209 19:00:57.984635 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984650 kubelet[1905]: W0209 19:00:57.984646 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.984717 kubelet[1905]: E0209 19:00:57.984656 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984804 kubelet[1905]: E0209 19:00:57.984790 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984804 kubelet[1905]: W0209 19:00:57.984802 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.984880 kubelet[1905]: E0209 19:00:57.984812 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.984964 kubelet[1905]: E0209 19:00:57.984950 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.984964 kubelet[1905]: W0209 19:00:57.984961 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.985033 kubelet[1905]: E0209 19:00:57.984971 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.985108 kubelet[1905]: E0209 19:00:57.985087 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.985108 kubelet[1905]: W0209 19:00:57.985105 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.985184 kubelet[1905]: E0209 19:00:57.985115 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.985265 kubelet[1905]: E0209 19:00:57.985252 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:57.985265 kubelet[1905]: W0209 19:00:57.985262 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:57.985340 kubelet[1905]: E0209 19:00:57.985273 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:57.998965 env[1357]: time="2024-02-09T19:00:57.998916185Z" level=info msg="CreateContainer within sandbox \"23ad0b61564c9f287ed901a6091950a1ffb666f88960d7cf3103d4ba0e07a18d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3e2977075f71458f8a546f1119785eb6df0cb5d7a85570a51081639c0ee096cd\"" Feb 9 19:00:57.999922 env[1357]: time="2024-02-09T19:00:57.999890091Z" level=info msg="StartContainer for \"3e2977075f71458f8a546f1119785eb6df0cb5d7a85570a51081639c0ee096cd\"" Feb 9 19:00:58.018392 systemd[1]: Started cri-containerd-3e2977075f71458f8a546f1119785eb6df0cb5d7a85570a51081639c0ee096cd.scope. Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.040623 kernel: kauditd_printk_skb: 109 callbacks suppressed Feb 9 19:00:58.040712 kernel: audit: type=1400 audit(1707505258.034:623): avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2019 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.058250 kubelet[1905]: E0209 19:00:58.058072 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.058250 kubelet[1905]: W0209 19:00:58.058092 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.058250 kubelet[1905]: E0209 19:00:58.058122 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.084123 kernel: audit: type=1300 audit(1707505258.034:623): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2019 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.084245 kernel: audit: type=1327 audit(1707505258.034:623): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365323937373037356637313435386638613534366631313139373835 Feb 9 19:00:58.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365323937373037356637313435386638613534366631313139373835 Feb 9 19:00:58.084605 kubelet[1905]: E0209 19:00:58.084393 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.084605 kubelet[1905]: W0209 19:00:58.084423 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.084605 kubelet[1905]: E0209 19:00:58.084456 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.091519 kubelet[1905]: E0209 19:00:58.091369 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.091519 kubelet[1905]: W0209 19:00:58.091387 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.091519 kubelet[1905]: E0209 19:00:58.091484 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.093454 kubelet[1905]: E0209 19:00:58.093343 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.093454 kubelet[1905]: W0209 19:00:58.093355 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.093454 kubelet[1905]: E0209 19:00:58.093374 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.095427 kubelet[1905]: E0209 19:00:58.095322 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.095427 kubelet[1905]: W0209 19:00:58.095334 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.095427 kubelet[1905]: E0209 19:00:58.095407 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.125653 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.108348 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128097 kubelet[1905]: W0209 19:00:58.108367 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.108391 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.108912 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128097 kubelet[1905]: W0209 19:00:58.108922 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.109006 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.110190 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128097 kubelet[1905]: W0209 19:00:58.110215 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.110233 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128097 kubelet[1905]: E0209 19:00:58.110477 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128407 kubelet[1905]: W0209 19:00:58.110485 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.110544 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.111309 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128407 kubelet[1905]: W0209 19:00:58.111318 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.111332 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.111659 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128407 kubelet[1905]: W0209 19:00:58.111668 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.111684 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.128407 kubelet[1905]: E0209 19:00:58.113295 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.128407 kubelet[1905]: W0209 19:00:58.113306 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.128685 kubelet[1905]: E0209 19:00:58.113327 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.143187 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.143331 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.177754 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.212510 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.212706 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.230234 kernel: audit: type=1400 audit(1707505258.034:624): avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.034000 audit: BPF prog-id=76 op=LOAD Feb 9 19:00:58.034000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2019 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365323937373037356637313435386638613534366631313139373835 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.039000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.231043 env[1357]: time="2024-02-09T19:00:58.230997061Z" level=info msg="StartContainer for \"3e2977075f71458f8a546f1119785eb6df0cb5d7a85570a51081639c0ee096cd\" returns successfully" Feb 9 19:00:58.039000 audit: BPF prog-id=77 op=LOAD Feb 9 19:00:58.039000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2019 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365323937373037356637313435386638613534366631313139373835 Feb 9 19:00:58.057000 audit: BPF prog-id=77 op=UNLOAD Feb 9 19:00:58.057000 audit: BPF prog-id=76 op=UNLOAD Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { perfmon } for pid=2119 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit[2119]: AVC avc: denied { bpf } for pid=2119 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:58.057000 audit: BPF prog-id=78 op=LOAD Feb 9 19:00:58.057000 audit[2119]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2019 pid=2119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365323937373037356637313435386638613534366631313139373835 Feb 9 19:00:58.249000 audit[2180]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.249000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd5b9f850 a2=0 a3=ffff8ffce6c0 items=0 ppid=2130 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.249000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:00:58.252000 audit[2181]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.252000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd587b5e0 a2=0 a3=ffff8aead6c0 items=0 ppid=2130 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:00:58.253000 audit[2182]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.253000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffab24080 a2=0 a3=ffffafb506c0 items=0 ppid=2130 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.253000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 9 19:00:58.253000 audit[2183]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.253000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde584a00 a2=0 a3=ffff87cb36c0 items=0 ppid=2130 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.253000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:00:58.255000 audit[2185]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.255000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0d117e0 a2=0 a3=ffff8f2b56c0 items=0 ppid=2130 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.255000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 9 19:00:58.256000 audit[2186]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.256000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcfbbc210 a2=0 a3=ffffad8c56c0 items=0 ppid=2130 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 9 19:00:58.349632 kubelet[1905]: E0209 19:00:58.349597 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:58.352000 audit[2187]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.352000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc26994f0 a2=0 a3=ffff8e86f6c0 items=0 ppid=2130 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:00:58.355000 audit[2189]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.355000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe5e86e20 a2=0 a3=ffff9c7be6c0 items=0 ppid=2130 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 9 19:00:58.358000 audit[2192]: NETFILTER_CFG table=filter:46 family=2 entries=2 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.358000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffedb42590 a2=0 a3=ffffa02f96c0 items=0 ppid=2130 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 9 19:00:58.359000 audit[2193]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.359000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3e8ee40 a2=0 a3=ffffa19d26c0 items=0 ppid=2130 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:00:58.361000 audit[2195]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.361000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff29efa70 a2=0 a3=ffff867a16c0 items=0 ppid=2130 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:00:58.362000 audit[2196]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.362000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca297410 a2=0 a3=ffff9e78a6c0 items=0 ppid=2130 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:00:58.364000 audit[2198]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.364000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe0e45550 a2=0 a3=ffffbebab6c0 items=0 ppid=2130 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:00:58.367000 audit[2201]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.367000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc916b590 a2=0 a3=ffff8e9a46c0 items=0 ppid=2130 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 9 19:00:58.368000 audit[2202]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.368000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff925f2f0 a2=0 a3=ffffa25186c0 items=0 ppid=2130 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:00:58.370000 audit[2204]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.370000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffb4b0770 a2=0 a3=ffffbdcad6c0 items=0 ppid=2130 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:00:58.371000 audit[2205]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.371000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff722c710 a2=0 a3=ffffb21546c0 items=0 ppid=2130 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:00:58.373000 audit[2207]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.373000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2adebe0 a2=0 a3=ffffb82226c0 items=0 ppid=2130 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.373000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:00:58.376000 audit[2210]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.376000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd0092840 a2=0 a3=ffffb26bc6c0 items=0 ppid=2130 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:00:58.381000 audit[2213]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.381000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8e44cc0 a2=0 a3=ffff920116c0 items=0 ppid=2130 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:00:58.382000 audit[2214]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.382000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6d20200 a2=0 a3=ffffbe1f16c0 items=0 ppid=2130 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:00:58.384000 audit[2216]: NETFILTER_CFG table=nat:59 family=2 entries=2 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.384000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc1f90c10 a2=0 a3=ffffb969f6c0 items=0 ppid=2130 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.384000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:00:58.387000 audit[2219]: NETFILTER_CFG table=nat:60 family=2 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 9 19:00:58.387000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffec4ef070 a2=0 a3=ffffaf1a66c0 items=0 ppid=2130 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:00:58.392000 audit[2223]: NETFILTER_CFG table=filter:61 family=2 entries=3 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:00:58.392000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe14ff760 a2=0 a3=ffff80faa6c0 items=0 ppid=2130 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:00:58.466000 audit[2223]: NETFILTER_CFG table=nat:62 family=2 entries=68 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:00:58.466000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffe14ff760 a2=0 a3=ffff80faa6c0 items=0 ppid=2130 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:00:58.493000 audit[2230]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.493000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff41dbd80 a2=0 a3=ffff815906c0 items=0 ppid=2130 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 9 19:00:58.496000 audit[2232]: NETFILTER_CFG table=filter:64 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.496000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd30b72a0 a2=0 a3=ffff8a37f6c0 items=0 ppid=2130 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 9 19:00:58.499000 audit[2235]: NETFILTER_CFG table=filter:65 family=10 entries=2 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.499000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc75f9c60 a2=0 a3=ffff841ba6c0 items=0 ppid=2130 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 9 19:00:58.500000 audit[2236]: NETFILTER_CFG table=filter:66 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.500000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff45b99c0 a2=0 a3=ffffa3ccd6c0 items=0 ppid=2130 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 9 19:00:58.502000 audit[2238]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.502000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea6c7f60 a2=0 a3=ffff9d5106c0 items=0 ppid=2130 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 9 19:00:58.503000 audit[2239]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.503000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc63cb5b0 a2=0 a3=ffff851776c0 items=0 ppid=2130 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 9 19:00:58.506000 audit[2241]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.506000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeafeea80 a2=0 a3=ffff863fb6c0 items=0 ppid=2130 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 9 19:00:58.509000 audit[2244]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.509000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffcac9d0a0 a2=0 a3=ffffbf6226c0 items=0 ppid=2130 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 9 19:00:58.510000 audit[2245]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.510000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe3e37f90 a2=0 a3=ffffbda136c0 items=0 ppid=2130 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 9 19:00:58.512000 audit[2247]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.512000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd8c7660 a2=0 a3=ffffa86866c0 items=0 ppid=2130 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 9 19:00:58.513000 audit[2248]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.513000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc0be290 a2=0 a3=ffff8947a6c0 items=0 ppid=2130 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 9 19:00:58.515000 audit[2250]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.515000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcaa2f9c0 a2=0 a3=ffffbdbc56c0 items=0 ppid=2130 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 9 19:00:58.518000 audit[2253]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.518000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd7c8ec0 a2=0 a3=ffff89f7b6c0 items=0 ppid=2130 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.518000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 9 19:00:58.521000 audit[2256]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.521000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffcb1f980 a2=0 a3=ffff848f16c0 items=0 ppid=2130 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 9 19:00:58.522000 audit[2257]: NETFILTER_CFG table=nat:77 family=10 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.522000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd679880 a2=0 a3=ffff82cc76c0 items=0 ppid=2130 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 9 19:00:58.524000 audit[2259]: NETFILTER_CFG table=nat:78 family=10 entries=2 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.524000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff41eb950 a2=0 a3=ffff9d50d6c0 items=0 ppid=2130 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:00:58.527000 audit[2262]: NETFILTER_CFG table=nat:79 family=10 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 9 19:00:58.527000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc94c82c0 a2=0 a3=ffff8ff876c0 items=0 ppid=2130 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 9 19:00:58.533000 audit[2266]: NETFILTER_CFG table=filter:80 family=10 entries=3 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:00:58.533000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffde8d2d40 a2=0 a3=ffffbcd766c0 items=0 ppid=2130 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.533000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:00:58.534000 audit[2266]: NETFILTER_CFG table=nat:81 family=10 entries=10 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 9 19:00:58.534000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffde8d2d40 a2=0 a3=ffffbcd766c0 items=0 ppid=2130 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:58.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:00:58.910190 kubelet[1905]: I0209 19:00:58.910139 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-d76dh" podStartSLOduration=-9.223372027944674e+09 pod.CreationTimestamp="2024-02-09 19:00:50 +0000 UTC" firstStartedPulling="2024-02-09 19:00:55.165531862 +0000 UTC m=+18.308894074" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:00:58.910039158 +0000 UTC m=+22.053401370" watchObservedRunningTime="2024-02-09 19:00:58.910102867 +0000 UTC m=+22.053465079" Feb 9 19:00:58.990639 kubelet[1905]: E0209 19:00:58.990532 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.990639 kubelet[1905]: W0209 19:00:58.990554 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.990639 kubelet[1905]: E0209 19:00:58.990574 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.990989 kubelet[1905]: E0209 19:00:58.990894 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.990989 kubelet[1905]: W0209 19:00:58.990906 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.990989 kubelet[1905]: E0209 19:00:58.990918 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.991278 kubelet[1905]: E0209 19:00:58.991137 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.991278 kubelet[1905]: W0209 19:00:58.991148 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.991278 kubelet[1905]: E0209 19:00:58.991160 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.991539 kubelet[1905]: E0209 19:00:58.991449 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.991539 kubelet[1905]: W0209 19:00:58.991460 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.991539 kubelet[1905]: E0209 19:00:58.991472 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.991775 kubelet[1905]: E0209 19:00:58.991686 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.991775 kubelet[1905]: W0209 19:00:58.991697 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.991775 kubelet[1905]: E0209 19:00:58.991708 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.992035 kubelet[1905]: E0209 19:00:58.991923 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.992035 kubelet[1905]: W0209 19:00:58.991934 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.992035 kubelet[1905]: E0209 19:00:58.991945 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.992290 kubelet[1905]: E0209 19:00:58.992191 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.992290 kubelet[1905]: W0209 19:00:58.992212 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.992290 kubelet[1905]: E0209 19:00:58.992225 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.992530 kubelet[1905]: E0209 19:00:58.992450 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.992530 kubelet[1905]: W0209 19:00:58.992460 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.992530 kubelet[1905]: E0209 19:00:58.992471 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.992809 kubelet[1905]: E0209 19:00:58.992675 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.992809 kubelet[1905]: W0209 19:00:58.992689 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.992809 kubelet[1905]: E0209 19:00:58.992701 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.993058 kubelet[1905]: E0209 19:00:58.992968 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.993058 kubelet[1905]: W0209 19:00:58.992979 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.993058 kubelet[1905]: E0209 19:00:58.992993 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.993311 kubelet[1905]: E0209 19:00:58.993225 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.993311 kubelet[1905]: W0209 19:00:58.993237 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.993311 kubelet[1905]: E0209 19:00:58.993248 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.993626 kubelet[1905]: E0209 19:00:58.993468 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.993626 kubelet[1905]: W0209 19:00:58.993478 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.993626 kubelet[1905]: E0209 19:00:58.993489 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.993865 kubelet[1905]: E0209 19:00:58.993766 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.993865 kubelet[1905]: W0209 19:00:58.993778 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.993865 kubelet[1905]: E0209 19:00:58.993790 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.994114 kubelet[1905]: E0209 19:00:58.994028 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.994114 kubelet[1905]: W0209 19:00:58.994040 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.994114 kubelet[1905]: E0209 19:00:58.994051 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.994394 kubelet[1905]: E0209 19:00:58.994299 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.994394 kubelet[1905]: W0209 19:00:58.994310 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.994394 kubelet[1905]: E0209 19:00:58.994321 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:58.994606 kubelet[1905]: E0209 19:00:58.994547 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:58.994606 kubelet[1905]: W0209 19:00:58.994557 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:58.994606 kubelet[1905]: E0209 19:00:58.994575 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.089989 kubelet[1905]: E0209 19:00:59.089967 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.090148 kubelet[1905]: W0209 19:00:59.090133 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.090241 kubelet[1905]: E0209 19:00:59.090231 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.090481 kubelet[1905]: E0209 19:00:59.090469 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.090553 kubelet[1905]: W0209 19:00:59.090541 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.090620 kubelet[1905]: E0209 19:00:59.090611 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.090852 kubelet[1905]: E0209 19:00:59.090833 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.090852 kubelet[1905]: W0209 19:00:59.090849 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.090939 kubelet[1905]: E0209 19:00:59.090867 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.091015 kubelet[1905]: E0209 19:00:59.091002 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.091015 kubelet[1905]: W0209 19:00:59.091014 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.091079 kubelet[1905]: E0209 19:00:59.091028 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.091180 kubelet[1905]: E0209 19:00:59.091165 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.091180 kubelet[1905]: W0209 19:00:59.091177 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.091260 kubelet[1905]: E0209 19:00:59.091188 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.091401 kubelet[1905]: E0209 19:00:59.091383 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.091401 kubelet[1905]: W0209 19:00:59.091397 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.091471 kubelet[1905]: E0209 19:00:59.091414 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.091665 kubelet[1905]: E0209 19:00:59.091652 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.091734 kubelet[1905]: W0209 19:00:59.091723 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.091805 kubelet[1905]: E0209 19:00:59.091795 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.092029 kubelet[1905]: E0209 19:00:59.092016 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.092104 kubelet[1905]: W0209 19:00:59.092092 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.092175 kubelet[1905]: E0209 19:00:59.092165 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.092387 kubelet[1905]: E0209 19:00:59.092369 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.092387 kubelet[1905]: W0209 19:00:59.092384 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.092477 kubelet[1905]: E0209 19:00:59.092403 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.092568 kubelet[1905]: E0209 19:00:59.092552 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.092606 kubelet[1905]: W0209 19:00:59.092569 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.092606 kubelet[1905]: E0209 19:00:59.092581 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.092749 kubelet[1905]: E0209 19:00:59.092735 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.092749 kubelet[1905]: W0209 19:00:59.092748 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.092808 kubelet[1905]: E0209 19:00:59.092759 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.093026 kubelet[1905]: E0209 19:00:59.093012 1905 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 9 19:00:59.093026 kubelet[1905]: W0209 19:00:59.093024 1905 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 9 19:00:59.093085 kubelet[1905]: E0209 19:00:59.093036 1905 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 9 19:00:59.350346 kubelet[1905]: E0209 19:00:59.350243 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:00:59.371780 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3731565423.mount: Deactivated successfully. Feb 9 19:00:59.666790 env[1357]: time="2024-02-09T19:00:59.666742364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:59.681322 env[1357]: time="2024-02-09T19:00:59.681274773Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:59.692513 env[1357]: time="2024-02-09T19:00:59.692470110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:59.703836 env[1357]: time="2024-02-09T19:00:59.703798504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:00:59.704169 env[1357]: time="2024-02-09T19:00:59.704137766Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 9 19:00:59.706042 env[1357]: time="2024-02-09T19:00:59.706004089Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 9 19:00:59.756847 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount21370731.mount: Deactivated successfully. Feb 9 19:00:59.795627 env[1357]: time="2024-02-09T19:00:59.795574581Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952\"" Feb 9 19:00:59.796286 env[1357]: time="2024-02-09T19:00:59.796262704Z" level=info msg="StartContainer for \"25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952\"" Feb 9 19:00:59.811175 systemd[1]: Started cri-containerd-25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952.scope. Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235666330373664643961316339393135663736623931356563303064 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit: BPF prog-id=79 op=LOAD Feb 9 19:00:59.823000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235666330373664643961316339393135663736623931356563303064 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.823000 audit: BPF prog-id=80 op=LOAD Feb 9 19:00:59.823000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:59.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235666330373664643961316339393135663736623931356563303064 Feb 9 19:00:59.824000 audit: BPF prog-id=80 op=UNLOAD Feb 9 19:00:59.824000 audit: BPF prog-id=79 op=UNLOAD Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { perfmon } for pid=2303 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit[2303]: AVC avc: denied { bpf } for pid=2303 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:00:59.824000 audit: BPF prog-id=81 op=LOAD Feb 9 19:00:59.824000 audit[2303]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:00:59.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235666330373664643961316339393135663736623931356563303064 Feb 9 19:00:59.846448 systemd[1]: cri-containerd-25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952.scope: Deactivated successfully. Feb 9 19:00:59.848000 audit: BPF prog-id=81 op=UNLOAD Feb 9 19:00:59.852431 env[1357]: time="2024-02-09T19:00:59.852386162Z" level=info msg="StartContainer for \"25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952\" returns successfully" Feb 9 19:00:59.871042 kubelet[1905]: E0209 19:00:59.869952 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:00.350798 kubelet[1905]: E0209 19:01:00.350760 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:00.414917 env[1357]: time="2024-02-09T19:01:00.414867537Z" level=info msg="shim disconnected" id=25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952 Feb 9 19:01:00.414917 env[1357]: time="2024-02-09T19:01:00.414915129Z" level=warning msg="cleaning up after shim disconnected" id=25fc076dd9a1c9915f76b915ec00d7ebc9defad50756405b817309288acfe952 namespace=k8s.io Feb 9 19:01:00.414917 env[1357]: time="2024-02-09T19:01:00.414924288Z" level=info msg="cleaning up dead shim" Feb 9 19:01:00.421843 env[1357]: time="2024-02-09T19:01:00.421795148Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:01:00Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2345 runtime=io.containerd.runc.v2\n" Feb 9 19:01:00.907966 env[1357]: time="2024-02-09T19:01:00.907902083Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 9 19:01:01.351698 kubelet[1905]: E0209 19:01:01.351593 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:01.871483 kubelet[1905]: E0209 19:01:01.871451 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:02.351954 kubelet[1905]: E0209 19:01:02.351860 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:02.686915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1429676972.mount: Deactivated successfully. Feb 9 19:01:03.352732 kubelet[1905]: E0209 19:01:03.352680 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:03.871786 kubelet[1905]: E0209 19:01:03.870383 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:04.353895 kubelet[1905]: E0209 19:01:04.353558 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:05.354234 kubelet[1905]: E0209 19:01:05.354180 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:05.871683 kubelet[1905]: E0209 19:01:05.870531 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:06.243703 env[1357]: time="2024-02-09T19:01:06.243382689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:06.262017 env[1357]: time="2024-02-09T19:01:06.261968892Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:06.271794 env[1357]: time="2024-02-09T19:01:06.271759362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:06.282712 env[1357]: time="2024-02-09T19:01:06.282652553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:06.283456 env[1357]: time="2024-02-09T19:01:06.283425122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 9 19:01:06.285702 env[1357]: time="2024-02-09T19:01:06.285673958Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 9 19:01:06.339000 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3087927577.mount: Deactivated successfully. Feb 9 19:01:06.355004 kubelet[1905]: E0209 19:01:06.354937 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:06.381511 env[1357]: time="2024-02-09T19:01:06.381458442Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49\"" Feb 9 19:01:06.382300 env[1357]: time="2024-02-09T19:01:06.382262126Z" level=info msg="StartContainer for \"9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49\"" Feb 9 19:01:06.404986 systemd[1]: Started cri-containerd-9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49.scope. Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.425608 kernel: kauditd_printk_skb: 209 callbacks suppressed Feb 9 19:01:06.425695 kernel: audit: type=1400 audit(1707505266.419:680): avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:06.468650 kernel: audit: type=1300 audit(1707505266.419:680): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:06.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963356638386137663864646332356332376466396561383462383861 Feb 9 19:01:06.492156 kernel: audit: type=1327 audit(1707505266.419:680): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963356638386137663864646332356332376466396561383462383861 Feb 9 19:01:06.492470 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.525353 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.541851 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.562469 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.569312 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.596832 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.614873 kernel: audit: type=1400 audit(1707505266.419:681): avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.419000 audit: BPF prog-id=82 op=LOAD Feb 9 19:01:06.419000 audit[2365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:06.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963356638386137663864646332356332376466396561383462383861 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.424000 audit: BPF prog-id=83 op=LOAD Feb 9 19:01:06.424000 audit[2365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:06.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963356638386137663864646332356332376466396561383462383861 Feb 9 19:01:06.441000 audit: BPF prog-id=83 op=UNLOAD Feb 9 19:01:06.441000 audit: BPF prog-id=82 op=UNLOAD Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { perfmon } for pid=2365 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit[2365]: AVC avc: denied { bpf } for pid=2365 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:06.441000 audit: BPF prog-id=84 op=LOAD Feb 9 19:01:06.441000 audit[2365]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:06.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963356638386137663864646332356332376466396561383462383861 Feb 9 19:01:06.616788 env[1357]: time="2024-02-09T19:01:06.616750433Z" level=info msg="StartContainer for \"9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49\" returns successfully" Feb 9 19:01:07.336490 systemd[1]: run-containerd-runc-k8s.io-9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49-runc.fzboY9.mount: Deactivated successfully. Feb 9 19:01:07.355478 kubelet[1905]: E0209 19:01:07.355449 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:07.870437 kubelet[1905]: E0209 19:01:07.870396 1905 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:07.935349 env[1357]: time="2024-02-09T19:01:07.935275895Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 9 19:01:07.938613 systemd[1]: cri-containerd-9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49.scope: Deactivated successfully. Feb 9 19:01:07.943000 audit: BPF prog-id=84 op=UNLOAD Feb 9 19:01:07.955420 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49-rootfs.mount: Deactivated successfully. Feb 9 19:01:08.036239 kubelet[1905]: I0209 19:01:08.035750 1905 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 9 19:01:08.356384 kubelet[1905]: E0209 19:01:08.356275 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:09.102171 env[1357]: time="2024-02-09T19:01:09.102126909Z" level=info msg="shim disconnected" id=9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49 Feb 9 19:01:09.102623 env[1357]: time="2024-02-09T19:01:09.102602965Z" level=warning msg="cleaning up after shim disconnected" id=9c5f88a7f8ddc25c27df9ea84b88a148c3ff05ffbfb2db262db9aa191dfecb49 namespace=k8s.io Feb 9 19:01:09.102722 env[1357]: time="2024-02-09T19:01:09.102708071Z" level=info msg="cleaning up dead shim" Feb 9 19:01:09.109772 env[1357]: time="2024-02-09T19:01:09.109740525Z" level=warning msg="cleanup warnings time=\"2024-02-09T19:01:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2412 runtime=io.containerd.runc.v2\n" Feb 9 19:01:09.357446 kubelet[1905]: E0209 19:01:09.357329 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:09.875043 systemd[1]: Created slice kubepods-besteffort-pod7ca1d03f_54ad_4d21_90f1_86b69a28b6ee.slice. Feb 9 19:01:09.877172 env[1357]: time="2024-02-09T19:01:09.877124036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6v5c6,Uid:7ca1d03f-54ad-4d21-90f1-86b69a28b6ee,Namespace:calico-system,Attempt:0,}" Feb 9 19:01:09.924087 env[1357]: time="2024-02-09T19:01:09.924047683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 9 19:01:10.049876 env[1357]: time="2024-02-09T19:01:10.049814103Z" level=error msg="Failed to destroy network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:10.051189 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443-shm.mount: Deactivated successfully. Feb 9 19:01:10.052290 env[1357]: time="2024-02-09T19:01:10.052253822Z" level=error msg="encountered an error cleaning up failed sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:10.052418 env[1357]: time="2024-02-09T19:01:10.052392043Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6v5c6,Uid:7ca1d03f-54ad-4d21-90f1-86b69a28b6ee,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:10.053687 kubelet[1905]: E0209 19:01:10.053319 1905 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:10.053687 kubelet[1905]: E0209 19:01:10.053389 1905 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:01:10.053687 kubelet[1905]: E0209 19:01:10.053412 1905 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-6v5c6" Feb 9 19:01:10.053915 kubelet[1905]: E0209 19:01:10.053478 1905 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-6v5c6_calico-system(7ca1d03f-54ad-4d21-90f1-86b69a28b6ee)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-6v5c6_calico-system(7ca1d03f-54ad-4d21-90f1-86b69a28b6ee)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:10.358433 kubelet[1905]: E0209 19:01:10.358322 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:10.926147 kubelet[1905]: I0209 19:01:10.925504 1905 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:10.926320 env[1357]: time="2024-02-09T19:01:10.926239343Z" level=info msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" Feb 9 19:01:10.946638 env[1357]: time="2024-02-09T19:01:10.946580666Z" level=error msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" failed" error="failed to destroy network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:10.947107 kubelet[1905]: E0209 19:01:10.946941 1905 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:10.947107 kubelet[1905]: E0209 19:01:10.947017 1905 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443} Feb 9 19:01:10.947107 kubelet[1905]: E0209 19:01:10.947060 1905 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:01:10.947107 kubelet[1905]: E0209 19:01:10.947089 1905 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-6v5c6" podUID=7ca1d03f-54ad-4d21-90f1-86b69a28b6ee Feb 9 19:01:11.217601 kubelet[1905]: I0209 19:01:11.217047 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:01:11.221663 systemd[1]: Created slice kubepods-besteffort-pod5521e8d7_dc6b_48f9_8cd1_0d9c07ee62ab.slice. Feb 9 19:01:11.359097 kubelet[1905]: E0209 19:01:11.359059 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:11.366556 kubelet[1905]: I0209 19:01:11.366531 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qsddq\" (UniqueName: \"kubernetes.io/projected/5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab-kube-api-access-qsddq\") pod \"nginx-deployment-8ffc5cf85-gznrm\" (UID: \"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab\") " pod="default/nginx-deployment-8ffc5cf85-gznrm" Feb 9 19:01:11.525247 env[1357]: time="2024-02-09T19:01:11.524822734Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gznrm,Uid:5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab,Namespace:default,Attempt:0,}" Feb 9 19:01:11.729846 env[1357]: time="2024-02-09T19:01:11.729787954Z" level=error msg="Failed to destroy network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:11.731061 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8-shm.mount: Deactivated successfully. Feb 9 19:01:11.732944 env[1357]: time="2024-02-09T19:01:11.732030305Z" level=error msg="encountered an error cleaning up failed sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:11.732944 env[1357]: time="2024-02-09T19:01:11.732086498Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gznrm,Uid:5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:11.733079 kubelet[1905]: E0209 19:01:11.732319 1905 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:11.733079 kubelet[1905]: E0209 19:01:11.732369 1905 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-gznrm" Feb 9 19:01:11.733079 kubelet[1905]: E0209 19:01:11.732390 1905 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-gznrm" Feb 9 19:01:11.733169 kubelet[1905]: E0209 19:01:11.732433 1905 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-gznrm_default(5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-gznrm_default(5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gznrm" podUID=5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab Feb 9 19:01:11.927715 kubelet[1905]: I0209 19:01:11.927682 1905 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:11.928458 env[1357]: time="2024-02-09T19:01:11.928421988Z" level=info msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" Feb 9 19:01:11.948220 env[1357]: time="2024-02-09T19:01:11.948150489Z" level=error msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" failed" error="failed to destroy network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 9 19:01:11.948446 kubelet[1905]: E0209 19:01:11.948421 1905 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:11.948500 kubelet[1905]: E0209 19:01:11.948476 1905 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8} Feb 9 19:01:11.948527 kubelet[1905]: E0209 19:01:11.948513 1905 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 9 19:01:11.948588 kubelet[1905]: E0209 19:01:11.948551 1905 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-gznrm" podUID=5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab Feb 9 19:01:12.360963 kubelet[1905]: E0209 19:01:12.360432 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:13.360800 kubelet[1905]: E0209 19:01:13.360755 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:14.361428 kubelet[1905]: E0209 19:01:14.361383 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:15.362551 kubelet[1905]: E0209 19:01:15.362504 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:16.363552 kubelet[1905]: E0209 19:01:16.363500 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:17.250956 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1381627270.mount: Deactivated successfully. Feb 9 19:01:17.335343 kubelet[1905]: E0209 19:01:17.335288 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:17.364523 kubelet[1905]: E0209 19:01:17.364492 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:17.611451 env[1357]: time="2024-02-09T19:01:17.611071567Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:17.636900 env[1357]: time="2024-02-09T19:01:17.636858486Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:17.649259 env[1357]: time="2024-02-09T19:01:17.649227525Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:17.668318 env[1357]: time="2024-02-09T19:01:17.668282727Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:17.668904 env[1357]: time="2024-02-09T19:01:17.668877380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 9 19:01:17.680819 env[1357]: time="2024-02-09T19:01:17.680773272Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 9 19:01:17.747099 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1171250871.mount: Deactivated successfully. Feb 9 19:01:17.787027 env[1357]: time="2024-02-09T19:01:17.786956367Z" level=info msg="CreateContainer within sandbox \"c0acd1e8bcf47b1dd371b46d58e1e4cf773025bbf5a3a74a41e3fba5a9bbca5e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18\"" Feb 9 19:01:17.787528 env[1357]: time="2024-02-09T19:01:17.787490466Z" level=info msg="StartContainer for \"84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18\"" Feb 9 19:01:17.802198 systemd[1]: Started cri-containerd-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18.scope. Feb 9 19:01:17.839129 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 9 19:01:17.839415 kernel: audit: type=1400 audit(1707505277.816:687): avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.816000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.816000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.864809 kernel: audit: type=1300 audit(1707505277.816:687): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653834643430336333313566396364316365636161626634306438 Feb 9 19:01:17.891805 kernel: audit: type=1327 audit(1707505277.816:687): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653834643430336333313566396364316365636161626634306438 Feb 9 19:01:17.891935 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.923859 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.940322 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.957111 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.974532 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.991502 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:18.008370 kernel: audit: type=1400 audit(1707505277.817:688): avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.817000 audit: BPF prog-id=85 op=LOAD Feb 9 19:01:17.817000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:18.008690 env[1357]: time="2024-02-09T19:01:18.008636115Z" level=info msg="StartContainer for \"84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18\" returns successfully" Feb 9 19:01:17.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653834643430336333313566396364316365636161626634306438 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.821000 audit: BPF prog-id=86 op=LOAD Feb 9 19:01:17.821000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653834643430336333313566396364316365636161626634306438 Feb 9 19:01:17.837000 audit: BPF prog-id=86 op=UNLOAD Feb 9 19:01:17.837000 audit: BPF prog-id=85 op=UNLOAD Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:17.837000 audit: BPF prog-id=87 op=LOAD Feb 9 19:01:17.837000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:17.837000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834653834643430336333313566396364316365636161626634306438 Feb 9 19:01:18.135907 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 9 19:01:18.136019 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 9 19:01:18.365472 kubelet[1905]: E0209 19:01:18.365432 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:18.954427 kubelet[1905]: I0209 19:01:18.954170 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-szzb9" podStartSLOduration=-9.223372007900648e+09 pod.CreationTimestamp="2024-02-09 19:00:50 +0000 UTC" firstStartedPulling="2024-02-09 19:00:55.17401635 +0000 UTC m=+18.317378562" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:01:18.953713893 +0000 UTC m=+42.097076145" watchObservedRunningTime="2024-02-09 19:01:18.954128167 +0000 UTC m=+42.097490339" Feb 9 19:01:18.957097 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.DKtFdZ.mount: Deactivated successfully. Feb 9 19:01:19.365991 kubelet[1905]: E0209 19:01:19.365640 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:19.411000 audit[2668]: AVC avc: denied { write } for pid=2668 comm="tee" name="fd" dev="proc" ino=17286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.411000 audit[2668]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd768a976 a2=241 a3=1b6 items=1 ppid=2619 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.411000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 9 19:01:19.411000 audit: PATH item=0 name="/dev/fd/63" inode=17280 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.411000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.413000 audit[2670]: AVC avc: denied { write } for pid=2670 comm="tee" name="fd" dev="proc" ino=17291 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.413000 audit[2670]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc686b987 a2=241 a3=1b6 items=1 ppid=2620 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.413000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 9 19:01:19.413000 audit: PATH item=0 name="/dev/fd/63" inode=17281 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.413000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.422000 audit[2674]: AVC avc: denied { write } for pid=2674 comm="tee" name="fd" dev="proc" ino=17295 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.422000 audit[2674]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd08d986 a2=241 a3=1b6 items=1 ppid=2632 pid=2674 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.422000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 9 19:01:19.422000 audit: PATH item=0 name="/dev/fd/63" inode=17290 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.422000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.433000 audit[2680]: AVC avc: denied { write } for pid=2680 comm="tee" name="fd" dev="proc" ino=17304 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.433000 audit[2680]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe633e985 a2=241 a3=1b6 items=1 ppid=2630 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.433000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 9 19:01:19.433000 audit: PATH item=0 name="/dev/fd/63" inode=18166 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.434000 audit[2684]: AVC avc: denied { write } for pid=2684 comm="tee" name="fd" dev="proc" ino=17308 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.434000 audit[2684]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc4ae5985 a2=241 a3=1b6 items=1 ppid=2634 pid=2684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.434000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 9 19:01:19.434000 audit: PATH item=0 name="/dev/fd/63" inode=17301 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.437000 audit[2678]: AVC avc: denied { write } for pid=2678 comm="tee" name="fd" dev="proc" ino=18170 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.439000 audit[2682]: AVC avc: denied { write } for pid=2682 comm="tee" name="fd" dev="proc" ino=18173 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 9 19:01:19.437000 audit[2678]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcd18f975 a2=241 a3=1b6 items=1 ppid=2623 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.437000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 9 19:01:19.437000 audit: PATH item=0 name="/dev/fd/63" inode=18165 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.437000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.439000 audit[2682]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffd445985 a2=241 a3=1b6 items=1 ppid=2627 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.439000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 9 19:01:19.439000 audit: PATH item=0 name="/dev/fd/63" inode=18167 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:01:19.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 9 19:01:19.639230 kernel: Initializing XFRM netlink socket Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit: BPF prog-id=88 op=LOAD Feb 9 19:01:19.764000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc33f6878 a2=70 a3=0 items=0 ppid=2631 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:01:19.764000 audit: BPF prog-id=88 op=UNLOAD Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit: BPF prog-id=89 op=LOAD Feb 9 19:01:19.764000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc33f6878 a2=70 a3=4a174c items=0 ppid=2631 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:01:19.764000 audit: BPF prog-id=89 op=UNLOAD Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffc33f68a8 a2=70 a3=156ff79f items=0 ppid=2631 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { perfmon } for pid=2757 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit[2757]: AVC avc: denied { bpf } for pid=2757 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.764000 audit: BPF prog-id=90 op=LOAD Feb 9 19:01:19.764000 audit[2757]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc33f67f8 a2=70 a3=156ff7b9 items=0 ppid=2631 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.764000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 9 19:01:19.775000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.775000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd17f3338 a2=70 a3=0 items=0 ppid=2631 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:01:19.775000 audit[2764]: AVC avc: denied { bpf } for pid=2764 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:19.775000 audit[2764]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd17f3218 a2=70 a3=2 items=0 ppid=2631 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.775000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 9 19:01:19.780000 audit: BPF prog-id=90 op=UNLOAD Feb 9 19:01:19.897000 audit[2785]: NETFILTER_CFG table=mangle:82 family=2 entries=19 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:19.897000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffc5e50c00 a2=0 a3=ffffad462fa8 items=0 ppid=2631 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.897000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:19.903000 audit[2787]: NETFILTER_CFG table=nat:83 family=2 entries=16 op=nft_register_chain pid=2787 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:19.903000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffcd4b6df0 a2=0 a3=ffffb446bfa8 items=0 ppid=2631 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.903000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:19.904000 audit[2788]: NETFILTER_CFG table=filter:84 family=2 entries=39 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:19.904000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffffe4a0470 a2=0 a3=ffffb8aaafa8 items=0 ppid=2631 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:19.913000 audit[2784]: NETFILTER_CFG table=raw:85 family=2 entries=19 op=nft_register_chain pid=2784 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:19.913000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=fffffd404870 a2=0 a3=ffff8cd55fa8 items=0 ppid=2631 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:19.913000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:19.958549 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.vLTZNt.mount: Deactivated successfully. Feb 9 19:01:20.366645 kubelet[1905]: E0209 19:01:20.366017 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:20.672499 systemd-networkd[1499]: vxlan.calico: Link UP Feb 9 19:01:20.672505 systemd-networkd[1499]: vxlan.calico: Gained carrier Feb 9 19:01:21.366643 kubelet[1905]: E0209 19:01:21.366591 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:22.367712 kubelet[1905]: E0209 19:01:22.367673 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:22.700423 systemd-networkd[1499]: vxlan.calico: Gained IPv6LL Feb 9 19:01:22.871514 env[1357]: time="2024-02-09T19:01:22.871468885Z" level=info msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] k8s.go 578: Cleaning up netns ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" iface="eth0" netns="/var/run/netns/cni-6169e9cf-f37c-3243-514d-e1f1030de484" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" iface="eth0" netns="/var/run/netns/cni-6169e9cf-f37c-3243-514d-e1f1030de484" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" iface="eth0" netns="/var/run/netns/cni-6169e9cf-f37c-3243-514d-e1f1030de484" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] k8s.go 585: Releasing IP address(es) ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.914 [INFO][2837] utils.go 188: Calico CNI releasing IP address ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.930 [INFO][2843] ipam_plugin.go 415: Releasing address using handleID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.930 [INFO][2843] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.930 [INFO][2843] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.941 [WARNING][2843] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.941 [INFO][2843] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.942 [INFO][2843] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:22.944103 env[1357]: 2024-02-09 19:01:22.943 [INFO][2837] k8s.go 591: Teardown processing complete. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:22.945561 systemd[1]: run-netns-cni\x2d6169e9cf\x2df37c\x2d3243\x2d514d\x2de1f1030de484.mount: Deactivated successfully. Feb 9 19:01:22.946944 env[1357]: time="2024-02-09T19:01:22.946885199Z" level=info msg="TearDown network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" successfully" Feb 9 19:01:22.947053 env[1357]: time="2024-02-09T19:01:22.947034663Z" level=info msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" returns successfully" Feb 9 19:01:22.947705 env[1357]: time="2024-02-09T19:01:22.947681557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gznrm,Uid:5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab,Namespace:default,Attempt:1,}" Feb 9 19:01:23.337530 systemd-networkd[1499]: calibda91f5e4dc: Link UP Feb 9 19:01:23.349117 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:01:23.349181 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibda91f5e4dc: link becomes ready Feb 9 19:01:23.349699 systemd-networkd[1499]: calibda91f5e4dc: Gained carrier Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.277 [INFO][2850] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0 nginx-deployment-8ffc5cf85- default 5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab 1286 0 2024-02-09 19:01:11 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.10 nginx-deployment-8ffc5cf85-gznrm eth0 default [] [] [kns.default ksa.default.default] calibda91f5e4dc [] []}} ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.277 [INFO][2850] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.299 [INFO][2862] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" HandleID="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.314 [INFO][2862] ipam_plugin.go 268: Auto assigning IP ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" HandleID="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.10", "pod":"nginx-deployment-8ffc5cf85-gznrm", "timestamp":"2024-02-09 19:01:23.299101739 +0000 UTC"}, Hostname:"10.200.20.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.314 [INFO][2862] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.314 [INFO][2862] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.314 [INFO][2862] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.10' Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.315 [INFO][2862] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.318 [INFO][2862] ipam.go 372: Looking up existing affinities for host host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.322 [INFO][2862] ipam.go 489: Trying affinity for 192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.323 [INFO][2862] ipam.go 155: Attempting to load block cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.325 [INFO][2862] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.325 [INFO][2862] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.326 [INFO][2862] ipam.go 1682: Creating new handle: k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5 Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.329 [INFO][2862] ipam.go 1203: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.332 [INFO][2862] ipam.go 1216: Successfully claimed IPs: [192.168.83.129/26] block=192.168.83.128/26 handle="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.332 [INFO][2862] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.129/26] handle="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" host="10.200.20.10" Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.332 [INFO][2862] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:23.366658 env[1357]: 2024-02-09 19:01:23.332 [INFO][2862] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.83.129/26] IPv6=[] ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" HandleID="k8s-pod-network.ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.335 [INFO][2850] k8s.go 385: Populated endpoint ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-gznrm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibda91f5e4dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.335 [INFO][2850] k8s.go 386: Calico CNI using IPs: [192.168.83.129/32] ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.335 [INFO][2850] dataplane_linux.go 68: Setting the host side veth name to calibda91f5e4dc ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.350 [INFO][2850] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.350 [INFO][2850] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab", ResourceVersion:"1286", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5", Pod:"nginx-deployment-8ffc5cf85-gznrm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibda91f5e4dc", MAC:"d2:96:d6:72:3c:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:23.367181 env[1357]: 2024-02-09 19:01:23.357 [INFO][2850] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5" Namespace="default" Pod="nginx-deployment-8ffc5cf85-gznrm" WorkloadEndpoint="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:23.368021 kubelet[1905]: E0209 19:01:23.367983 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:23.374000 audit[2883]: NETFILTER_CFG table=filter:86 family=2 entries=36 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:23.380919 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 9 19:01:23.381002 kernel: audit: type=1325 audit(1707505283.374:713): table=filter:86 family=2 entries=36 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:23.374000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffdd1ea760 a2=0 a3=ffffba88efa8 items=0 ppid=2631 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.400258 env[1357]: time="2024-02-09T19:01:23.400178782Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:01:23.400450 env[1357]: time="2024-02-09T19:01:23.400425957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:01:23.400566 env[1357]: time="2024-02-09T19:01:23.400544505Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:01:23.400813 env[1357]: time="2024-02-09T19:01:23.400784961Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5 pid=2890 runtime=io.containerd.runc.v2 Feb 9 19:01:23.421282 kernel: audit: type=1300 audit(1707505283.374:713): arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffdd1ea760 a2=0 a3=ffffba88efa8 items=0 ppid=2631 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.374000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:23.439235 kernel: audit: type=1327 audit(1707505283.374:713): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:23.441088 systemd[1]: Started cri-containerd-ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5.scope. Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.483179 kernel: audit: type=1400 audit(1707505283.448:714): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.483279 kernel: audit: type=1400 audit(1707505283.448:715): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.500323 kernel: audit: type=1400 audit(1707505283.448:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.523311 kernel: audit: type=1400 audit(1707505283.448:717): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.540400 kernel: audit: type=1400 audit(1707505283.448:718): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.556809 kernel: audit: type=1400 audit(1707505283.448:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.558051 env[1357]: time="2024-02-09T19:01:23.558013402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-gznrm,Uid:5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab,Namespace:default,Attempt:1,} returns sandbox id \"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5\"" Feb 9 19:01:23.559955 env[1357]: time="2024-02-09T19:01:23.559915851Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:01:23.573551 kernel: audit: type=1400 audit(1707505283.448:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.448000 audit: BPF prog-id=91 op=LOAD Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2890 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561326666313833306533303132346565646364376133306566326139 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2890 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561326666313833306533303132346565646364376133306566326139 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.449000 audit: BPF prog-id=92 op=LOAD Feb 9 19:01:23.449000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2890 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.449000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561326666313833306533303132346565646364376133306566326139 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.465000 audit: BPF prog-id=93 op=LOAD Feb 9 19:01:23.465000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2890 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561326666313833306533303132346565646364376133306566326139 Feb 9 19:01:23.481000 audit: BPF prog-id=93 op=UNLOAD Feb 9 19:01:23.481000 audit: BPF prog-id=92 op=UNLOAD Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { perfmon } for pid=2898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit[2898]: AVC avc: denied { bpf } for pid=2898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:23.481000 audit: BPF prog-id=94 op=LOAD Feb 9 19:01:23.481000 audit[2898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2890 pid=2898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:23.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561326666313833306533303132346565646364376133306566326139 Feb 9 19:01:24.368870 kubelet[1905]: E0209 19:01:24.368831 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:24.871160 env[1357]: time="2024-02-09T19:01:24.871128068Z" level=info msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.930 [INFO][2937] k8s.go 578: Cleaning up netns ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.930 [INFO][2937] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" iface="eth0" netns="/var/run/netns/cni-a3648967-55a1-e7a6-d3cd-ddfe585b15a8" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.931 [INFO][2937] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" iface="eth0" netns="/var/run/netns/cni-a3648967-55a1-e7a6-d3cd-ddfe585b15a8" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.931 [INFO][2937] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" iface="eth0" netns="/var/run/netns/cni-a3648967-55a1-e7a6-d3cd-ddfe585b15a8" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.931 [INFO][2937] k8s.go 585: Releasing IP address(es) ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.931 [INFO][2937] utils.go 188: Calico CNI releasing IP address ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.947 [INFO][2949] ipam_plugin.go 415: Releasing address using handleID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.947 [INFO][2949] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.947 [INFO][2949] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.956 [WARNING][2949] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.956 [INFO][2949] ipam_plugin.go 443: Releasing address using workloadID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.958 [INFO][2949] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:24.960662 env[1357]: 2024-02-09 19:01:24.959 [INFO][2937] k8s.go 591: Teardown processing complete. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:24.962516 systemd[1]: run-netns-cni\x2da3648967\x2d55a1\x2de7a6\x2dd3cd\x2dddfe585b15a8.mount: Deactivated successfully. Feb 9 19:01:24.963953 env[1357]: time="2024-02-09T19:01:24.963915000Z" level=info msg="TearDown network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" successfully" Feb 9 19:01:24.964018 env[1357]: time="2024-02-09T19:01:24.963953557Z" level=info msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" returns successfully" Feb 9 19:01:24.964572 env[1357]: time="2024-02-09T19:01:24.964541179Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6v5c6,Uid:7ca1d03f-54ad-4d21-90f1-86b69a28b6ee,Namespace:calico-system,Attempt:1,}" Feb 9 19:01:25.132386 systemd-networkd[1499]: calibda91f5e4dc: Gained IPv6LL Feb 9 19:01:25.184393 systemd-networkd[1499]: calia9dc9817088: Link UP Feb 9 19:01:25.196948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:01:25.197106 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia9dc9817088: link becomes ready Feb 9 19:01:25.198327 systemd-networkd[1499]: calia9dc9817088: Gained carrier Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.089 [INFO][2956] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.10-k8s-csi--node--driver--6v5c6-eth0 csi-node-driver- calico-system 7ca1d03f-54ad-4d21-90f1-86b69a28b6ee 1297 0 2024-02-09 19:00:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.10 csi-node-driver-6v5c6 eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia9dc9817088 [] []}} ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.089 [INFO][2956] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.121 [INFO][2967] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" HandleID="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.148 [INFO][2967] ipam_plugin.go 268: Auto assigning IP ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" HandleID="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400028f410), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.10", "pod":"csi-node-driver-6v5c6", "timestamp":"2024-02-09 19:01:25.121079169 +0000 UTC"}, Hostname:"10.200.20.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.148 [INFO][2967] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.148 [INFO][2967] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.148 [INFO][2967] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.10' Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.151 [INFO][2967] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.157 [INFO][2967] ipam.go 372: Looking up existing affinities for host host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.161 [INFO][2967] ipam.go 489: Trying affinity for 192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.162 [INFO][2967] ipam.go 155: Attempting to load block cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.165 [INFO][2967] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.165 [INFO][2967] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.166 [INFO][2967] ipam.go 1682: Creating new handle: k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904 Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.170 [INFO][2967] ipam.go 1203: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.180 [INFO][2967] ipam.go 1216: Successfully claimed IPs: [192.168.83.130/26] block=192.168.83.128/26 handle="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.180 [INFO][2967] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.130/26] handle="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" host="10.200.20.10" Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.180 [INFO][2967] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:25.220331 env[1357]: 2024-02-09 19:01:25.180 [INFO][2967] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.83.130/26] IPv6=[] ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" HandleID="k8s-pod-network.b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.182 [INFO][2956] k8s.go 385: Populated endpoint ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-csi--node--driver--6v5c6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 0, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"", Pod:"csi-node-driver-6v5c6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia9dc9817088", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.182 [INFO][2956] k8s.go 386: Calico CNI using IPs: [192.168.83.130/32] ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.182 [INFO][2956] dataplane_linux.go 68: Setting the host side veth name to calia9dc9817088 ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.184 [INFO][2956] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.184 [INFO][2956] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-csi--node--driver--6v5c6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee", ResourceVersion:"1297", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 0, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904", Pod:"csi-node-driver-6v5c6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia9dc9817088", MAC:"ba:3f:8b:85:7f:c2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:25.220856 env[1357]: 2024-02-09 19:01:25.211 [INFO][2956] k8s.go 491: Wrote updated endpoint to datastore ContainerID="b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904" Namespace="calico-system" Pod="csi-node-driver-6v5c6" WorkloadEndpoint="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:25.230000 audit[2983]: NETFILTER_CFG table=filter:87 family=2 entries=40 op=nft_register_chain pid=2983 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:25.230000 audit[2983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffed1dd100 a2=0 a3=ffff9a901fa8 items=0 ppid=2631 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.230000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:25.255452 env[1357]: time="2024-02-09T19:01:25.255311423Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:01:25.255690 env[1357]: time="2024-02-09T19:01:25.255663629Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:01:25.255785 env[1357]: time="2024-02-09T19:01:25.255765419Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:01:25.256763 env[1357]: time="2024-02-09T19:01:25.255991597Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904 pid=2996 runtime=io.containerd.runc.v2 Feb 9 19:01:25.272542 systemd[1]: Started cri-containerd-b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904.scope. Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.297000 audit: BPF prog-id=95 op=LOAD Feb 9 19:01:25.298000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.298000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2996 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646337343062303736343937303634356663373330663334313532 Feb 9 19:01:25.298000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.298000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2996 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646337343062303736343937303634356663373330663334313532 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit: BPF prog-id=96 op=LOAD Feb 9 19:01:25.299000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2996 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646337343062303736343937303634356663373330663334313532 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.299000 audit: BPF prog-id=97 op=LOAD Feb 9 19:01:25.299000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2996 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646337343062303736343937303634356663373330663334313532 Feb 9 19:01:25.300000 audit: BPF prog-id=97 op=UNLOAD Feb 9 19:01:25.300000 audit: BPF prog-id=96 op=UNLOAD Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:25.300000 audit: BPF prog-id=98 op=LOAD Feb 9 19:01:25.300000 audit[3006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2996 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:25.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233646337343062303736343937303634356663373330663334313532 Feb 9 19:01:25.315686 env[1357]: time="2024-02-09T19:01:25.315650706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-6v5c6,Uid:7ca1d03f-54ad-4d21-90f1-86b69a28b6ee,Namespace:calico-system,Attempt:1,} returns sandbox id \"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904\"" Feb 9 19:01:25.369002 kubelet[1905]: E0209 19:01:25.368971 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:26.284972 systemd-networkd[1499]: calia9dc9817088: Gained IPv6LL Feb 9 19:01:26.370210 kubelet[1905]: E0209 19:01:26.370162 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:26.770987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2134248207.mount: Deactivated successfully. Feb 9 19:01:27.371008 kubelet[1905]: E0209 19:01:27.370957 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:27.953056 env[1357]: time="2024-02-09T19:01:27.953015129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:27.971664 env[1357]: time="2024-02-09T19:01:27.971199594Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:27.983976 env[1357]: time="2024-02-09T19:01:27.983940686Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:27.997554 env[1357]: time="2024-02-09T19:01:27.997516380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:27.998413 env[1357]: time="2024-02-09T19:01:27.998387459Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 19:01:27.999973 env[1357]: time="2024-02-09T19:01:27.999950193Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 9 19:01:28.000892 env[1357]: time="2024-02-09T19:01:28.000867468Z" level=info msg="CreateContainer within sandbox \"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 9 19:01:28.080714 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1145501663.mount: Deactivated successfully. Feb 9 19:01:28.085859 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount798250622.mount: Deactivated successfully. Feb 9 19:01:28.120810 env[1357]: time="2024-02-09T19:01:28.120745452Z" level=info msg="CreateContainer within sandbox \"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"5bb045aca463c1d5480a9b43e0a09f4835721b3c3e7a3699d61d41ecd9a86156\"" Feb 9 19:01:28.121578 env[1357]: time="2024-02-09T19:01:28.121553938Z" level=info msg="StartContainer for \"5bb045aca463c1d5480a9b43e0a09f4835721b3c3e7a3699d61d41ecd9a86156\"" Feb 9 19:01:28.138435 systemd[1]: Started cri-containerd-5bb045aca463c1d5480a9b43e0a09f4835721b3c3e7a3699d61d41ecd9a86156.scope. Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.149000 audit: BPF prog-id=99 op=LOAD Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2890 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:28.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623034356163613436336331643534383061396234336530613039 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2890 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:28.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623034356163613436336331643534383061396234336530613039 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.150000 audit: BPF prog-id=100 op=LOAD Feb 9 19:01:28.150000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2890 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:28.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623034356163613436336331643534383061396234336530613039 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit: BPF prog-id=101 op=LOAD Feb 9 19:01:28.151000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2890 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:28.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623034356163613436336331643534383061396234336530613039 Feb 9 19:01:28.151000 audit: BPF prog-id=101 op=UNLOAD Feb 9 19:01:28.151000 audit: BPF prog-id=100 op=UNLOAD Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { perfmon } for pid=3038 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit[3038]: AVC avc: denied { bpf } for pid=3038 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:28.151000 audit: BPF prog-id=102 op=LOAD Feb 9 19:01:28.151000 audit[3038]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2890 pid=3038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:28.151000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562623034356163613436336331643534383061396234336530613039 Feb 9 19:01:28.179510 env[1357]: time="2024-02-09T19:01:28.179454837Z" level=info msg="StartContainer for \"5bb045aca463c1d5480a9b43e0a09f4835721b3c3e7a3699d61d41ecd9a86156\" returns successfully" Feb 9 19:01:28.371359 kubelet[1905]: E0209 19:01:28.371326 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:28.967922 kubelet[1905]: I0209 19:01:28.967886 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-gznrm" podStartSLOduration=-9.223372018886923e+09 pod.CreationTimestamp="2024-02-09 19:01:11 +0000 UTC" firstStartedPulling="2024-02-09 19:01:23.55942334 +0000 UTC m=+46.702785552" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:01:28.967460251 +0000 UTC m=+52.110822463" watchObservedRunningTime="2024-02-09 19:01:28.967853815 +0000 UTC m=+52.111216027" Feb 9 19:01:29.371723 kubelet[1905]: E0209 19:01:29.371697 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:30.005977 env[1357]: time="2024-02-09T19:01:30.005913291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:30.021276 env[1357]: time="2024-02-09T19:01:30.021248656Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:30.032504 env[1357]: time="2024-02-09T19:01:30.032477024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:30.043636 env[1357]: time="2024-02-09T19:01:30.043596082Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:30.044299 env[1357]: time="2024-02-09T19:01:30.044253984Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 9 19:01:30.046434 env[1357]: time="2024-02-09T19:01:30.046407393Z" level=info msg="CreateContainer within sandbox \"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 9 19:01:30.112352 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount898313091.mount: Deactivated successfully. Feb 9 19:01:30.151462 env[1357]: time="2024-02-09T19:01:30.151416475Z" level=info msg="CreateContainer within sandbox \"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"782e8c8a74384fe698e51f0fa763f49c99008da54de00a753330d9ea77fda24d\"" Feb 9 19:01:30.152460 env[1357]: time="2024-02-09T19:01:30.152431665Z" level=info msg="StartContainer for \"782e8c8a74384fe698e51f0fa763f49c99008da54de00a753330d9ea77fda24d\"" Feb 9 19:01:30.175112 systemd[1]: Started cri-containerd-782e8c8a74384fe698e51f0fa763f49c99008da54de00a753330d9ea77fda24d.scope. Feb 9 19:01:30.187000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.193845 kernel: kauditd_printk_skb: 167 callbacks suppressed Feb 9 19:01:30.193927 kernel: audit: type=1400 audit(1707505290.187:769): avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.187000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2996 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.234805 kernel: audit: type=1300 audit(1707505290.187:769): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2996 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.234927 kernel: audit: type=1327 audit(1707505290.187:769): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738326538633861373433383466653639386535316630666137363366 Feb 9 19:01:30.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738326538633861373433383466653639386535316630666137363366 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.274059 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.290694 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.307219 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.324075 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.341824 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.341923 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.372456 kubelet[1905]: E0209 19:01:30.372414 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:30.374053 kernel: audit: type=1400 audit(1707505290.191:770): avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.191000 audit: BPF prog-id=103 op=LOAD Feb 9 19:01:30.191000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2996 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738326538633861373433383466653639386535316630666137363366 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.192000 audit: BPF prog-id=104 op=LOAD Feb 9 19:01:30.192000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2996 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738326538633861373433383466653639386535316630666137363366 Feb 9 19:01:30.208000 audit: BPF prog-id=104 op=UNLOAD Feb 9 19:01:30.208000 audit: BPF prog-id=103 op=UNLOAD Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { perfmon } for pid=3101 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit[3101]: AVC avc: denied { bpf } for pid=3101 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:30.209000 audit: BPF prog-id=105 op=LOAD Feb 9 19:01:30.209000 audit[3101]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2996 pid=3101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:30.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3738326538633861373433383466653639386535316630666137363366 Feb 9 19:01:30.383430 env[1357]: time="2024-02-09T19:01:30.383387898Z" level=info msg="StartContainer for \"782e8c8a74384fe698e51f0fa763f49c99008da54de00a753330d9ea77fda24d\" returns successfully" Feb 9 19:01:30.384632 env[1357]: time="2024-02-09T19:01:30.384605990Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 9 19:01:31.110313 systemd[1]: run-containerd-runc-k8s.io-782e8c8a74384fe698e51f0fa763f49c99008da54de00a753330d9ea77fda24d-runc.J0pzyG.mount: Deactivated successfully. Feb 9 19:01:31.373105 kubelet[1905]: E0209 19:01:31.373075 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:32.373625 kubelet[1905]: E0209 19:01:32.373584 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:32.618416 env[1357]: time="2024-02-09T19:01:32.618359103Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:32.637859 env[1357]: time="2024-02-09T19:01:32.637509509Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:32.646660 env[1357]: time="2024-02-09T19:01:32.646623331Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:32.657556 env[1357]: time="2024-02-09T19:01:32.657518081Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:32.658219 env[1357]: time="2024-02-09T19:01:32.658168465Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 9 19:01:32.660546 env[1357]: time="2024-02-09T19:01:32.660520744Z" level=info msg="CreateContainer within sandbox \"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 9 19:01:32.725480 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3912228311.mount: Deactivated successfully. Feb 9 19:01:32.766525 env[1357]: time="2024-02-09T19:01:32.766478740Z" level=info msg="CreateContainer within sandbox \"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"25557746e2c028233e3674386b25cb17d2e83f002beecc5eeaaaec798c04db04\"" Feb 9 19:01:32.767334 env[1357]: time="2024-02-09T19:01:32.767294550Z" level=info msg="StartContainer for \"25557746e2c028233e3674386b25cb17d2e83f002beecc5eeaaaec798c04db04\"" Feb 9 19:01:32.791962 systemd[1]: Started cri-containerd-25557746e2c028233e3674386b25cb17d2e83f002beecc5eeaaaec798c04db04.scope. Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2996 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235353537373436653263303238323333653336373433383662323563 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.804000 audit: BPF prog-id=106 op=LOAD Feb 9 19:01:32.804000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2996 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235353537373436653263303238323333653336373433383662323563 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit: BPF prog-id=107 op=LOAD Feb 9 19:01:32.805000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2996 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235353537373436653263303238323333653336373433383662323563 Feb 9 19:01:32.805000 audit: BPF prog-id=107 op=UNLOAD Feb 9 19:01:32.805000 audit: BPF prog-id=106 op=UNLOAD Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { perfmon } for pid=3162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit[3162]: AVC avc: denied { bpf } for pid=3162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:32.805000 audit: BPF prog-id=108 op=LOAD Feb 9 19:01:32.805000 audit[3162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2996 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235353537373436653263303238323333653336373433383662323563 Feb 9 19:01:32.810058 kubelet[1905]: I0209 19:01:32.809345 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:01:32.814920 systemd[1]: Created slice kubepods-besteffort-pod7b31355c_5f90_443b_90b8_79d27c921996.slice. Feb 9 19:01:32.838014 env[1357]: time="2024-02-09T19:01:32.837963198Z" level=info msg="StartContainer for \"25557746e2c028233e3674386b25cb17d2e83f002beecc5eeaaaec798c04db04\" returns successfully" Feb 9 19:01:32.848000 audit[3175]: NETFILTER_CFG table=filter:88 family=2 entries=18 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.848000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffd59ddfd0 a2=0 a3=ffffa955b6c0 items=0 ppid=2130 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.850000 audit[3175]: NETFILTER_CFG table=nat:89 family=2 entries=94 op=nft_register_rule pid=3175 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.850000 audit[3175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffd59ddfd0 a2=0 a3=ffffa955b6c0 items=0 ppid=2130 pid=3175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.850000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.865730 kubelet[1905]: I0209 19:01:32.865690 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/7b31355c-5f90-443b-90b8-79d27c921996-data\") pod \"nfs-server-provisioner-0\" (UID: \"7b31355c-5f90-443b-90b8-79d27c921996\") " pod="default/nfs-server-provisioner-0" Feb 9 19:01:32.865730 kubelet[1905]: I0209 19:01:32.865740 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gzq7n\" (UniqueName: \"kubernetes.io/projected/7b31355c-5f90-443b-90b8-79d27c921996-kube-api-access-gzq7n\") pod \"nfs-server-provisioner-0\" (UID: \"7b31355c-5f90-443b-90b8-79d27c921996\") " pod="default/nfs-server-provisioner-0" Feb 9 19:01:32.888000 audit[3222]: NETFILTER_CFG table=filter:90 family=2 entries=30 op=nft_register_rule pid=3222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.888000 audit[3222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffe696e910 a2=0 a3=ffff8a23d6c0 items=0 ppid=2130 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:32.890000 audit[3222]: NETFILTER_CFG table=nat:91 family=2 entries=94 op=nft_register_rule pid=3222 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:32.890000 audit[3222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffe696e910 a2=0 a3=ffff8a23d6c0 items=0 ppid=2130 pid=3222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:32.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:33.119368 env[1357]: time="2024-02-09T19:01:33.119326265Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7b31355c-5f90-443b-90b8-79d27c921996,Namespace:default,Attempt:0,}" Feb 9 19:01:33.334522 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:01:33.334623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 9 19:01:33.322594 systemd-networkd[1499]: cali60e51b789ff: Link UP Feb 9 19:01:33.336823 systemd-networkd[1499]: cali60e51b789ff: Gained carrier Feb 9 19:01:33.344470 kubelet[1905]: I0209 19:01:33.344160 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-6v5c6" podStartSLOduration=-9.223371993510658e+09 pod.CreationTimestamp="2024-02-09 19:00:50 +0000 UTC" firstStartedPulling="2024-02-09 19:01:25.317185557 +0000 UTC m=+48.460547769" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:01:32.981275324 +0000 UTC m=+56.124637536" watchObservedRunningTime="2024-02-09 19:01:33.344118397 +0000 UTC m=+56.487480609" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.253 [INFO][3224] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.10-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 7b31355c-5f90-443b-90b8-79d27c921996 1347 0 2024-02-09 19:01:32 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.10 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.254 [INFO][3224] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.276 [INFO][3237] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" HandleID="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Workload="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.289 [INFO][3237] ipam_plugin.go 268: Auto assigning IP ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" HandleID="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Workload="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.10", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-09 19:01:33.276796408 +0000 UTC"}, Hostname:"10.200.20.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.289 [INFO][3237] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.289 [INFO][3237] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.289 [INFO][3237] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.10' Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.290 [INFO][3237] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.294 [INFO][3237] ipam.go 372: Looking up existing affinities for host host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.297 [INFO][3237] ipam.go 489: Trying affinity for 192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.298 [INFO][3237] ipam.go 155: Attempting to load block cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.301 [INFO][3237] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.301 [INFO][3237] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.302 [INFO][3237] ipam.go 1682: Creating new handle: k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18 Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.305 [INFO][3237] ipam.go 1203: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.317 [INFO][3237] ipam.go 1216: Successfully claimed IPs: [192.168.83.131/26] block=192.168.83.128/26 handle="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.317 [INFO][3237] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.131/26] handle="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" host="10.200.20.10" Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.318 [INFO][3237] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:33.346085 env[1357]: 2024-02-09 19:01:33.318 [INFO][3237] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.83.131/26] IPv6=[] ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" HandleID="k8s-pod-network.5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Workload="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346646 env[1357]: 2024-02-09 19:01:33.319 [INFO][3224] k8s.go 385: Populated endpoint ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7b31355c-5f90-443b-90b8-79d27c921996", ResourceVersion:"1347", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:33.346646 env[1357]: 2024-02-09 19:01:33.319 [INFO][3224] k8s.go 386: Calico CNI using IPs: [192.168.83.131/32] ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346646 env[1357]: 2024-02-09 19:01:33.319 [INFO][3224] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346646 env[1357]: 2024-02-09 19:01:33.337 [INFO][3224] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.346788 env[1357]: 2024-02-09 19:01:33.337 [INFO][3224] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"7b31355c-5f90-443b-90b8-79d27c921996", ResourceVersion:"1347", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 32, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.83.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"e2:e2:14:13:2c:1e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:33.346788 env[1357]: 2024-02-09 19:01:33.344 [INFO][3224] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.10-k8s-nfs--server--provisioner--0-eth0" Feb 9 19:01:33.362000 audit[3257]: NETFILTER_CFG table=filter:92 family=2 entries=38 op=nft_register_chain pid=3257 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:01:33.362000 audit[3257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19500 a0=3 a1=ffffe6bbead0 a2=0 a3=ffffad017fa8 items=0 ppid=2631 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.362000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:01:33.374310 kubelet[1905]: E0209 19:01:33.374273 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:33.377999 env[1357]: time="2024-02-09T19:01:33.377928559Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:01:33.378117 env[1357]: time="2024-02-09T19:01:33.378096185Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:01:33.378254 env[1357]: time="2024-02-09T19:01:33.378230854Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:01:33.378599 env[1357]: time="2024-02-09T19:01:33.378554947Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18 pid=3266 runtime=io.containerd.runc.v2 Feb 9 19:01:33.388509 systemd[1]: Started cri-containerd-5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18.scope. Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit: BPF prog-id=109 op=LOAD Feb 9 19:01:33.398000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.398000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3266 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313432643734663736663738376562646438333665616335323563 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3266 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313432643734663736663738376562646438333665616335323563 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit: BPF prog-id=110 op=LOAD Feb 9 19:01:33.399000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3266 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313432643734663736663738376562646438333665616335323563 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.399000 audit: BPF prog-id=111 op=LOAD Feb 9 19:01:33.399000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3266 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313432643734663736663738376562646438333665616335323563 Feb 9 19:01:33.400000 audit: BPF prog-id=111 op=UNLOAD Feb 9 19:01:33.400000 audit: BPF prog-id=110 op=UNLOAD Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { perfmon } for pid=3277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit[3277]: AVC avc: denied { bpf } for pid=3277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:33.400000 audit: BPF prog-id=112 op=LOAD Feb 9 19:01:33.400000 audit[3277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3266 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:33.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566313432643734663736663738376562646438333665616335323563 Feb 9 19:01:33.419772 env[1357]: time="2024-02-09T19:01:33.419737370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:7b31355c-5f90-443b-90b8-79d27c921996,Namespace:default,Attempt:0,} returns sandbox id \"5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18\"" Feb 9 19:01:33.422381 env[1357]: time="2024-02-09T19:01:33.422356151Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 9 19:01:33.598426 kubelet[1905]: I0209 19:01:33.595905 1905 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 9 19:01:33.598426 kubelet[1905]: I0209 19:01:33.595934 1905 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 9 19:01:33.725061 systemd[1]: run-containerd-runc-k8s.io-25557746e2c028233e3674386b25cb17d2e83f002beecc5eeaaaec798c04db04-runc.PFOteD.mount: Deactivated successfully. Feb 9 19:01:34.374623 kubelet[1905]: E0209 19:01:34.374571 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:34.605367 systemd-networkd[1499]: cali60e51b789ff: Gained IPv6LL Feb 9 19:01:35.375607 kubelet[1905]: E0209 19:01:35.375571 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:36.376296 kubelet[1905]: E0209 19:01:36.376243 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:37.335092 kubelet[1905]: E0209 19:01:37.335063 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:37.341760 env[1357]: time="2024-02-09T19:01:37.341726035Z" level=info msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" Feb 9 19:01:37.376533 kubelet[1905]: E0209 19:01:37.376474 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:37.429915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1081792147.mount: Deactivated successfully. Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.393 [WARNING][3315] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab", ResourceVersion:"1312", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5", Pod:"nginx-deployment-8ffc5cf85-gznrm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibda91f5e4dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.395 [INFO][3315] k8s.go 578: Cleaning up netns ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.395 [INFO][3315] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" iface="eth0" netns="" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.395 [INFO][3315] k8s.go 585: Releasing IP address(es) ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.395 [INFO][3315] utils.go 188: Calico CNI releasing IP address ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.416 [INFO][3321] ipam_plugin.go 415: Releasing address using handleID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.416 [INFO][3321] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.416 [INFO][3321] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.426 [WARNING][3321] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.426 [INFO][3321] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.427 [INFO][3321] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:37.434930 env[1357]: 2024-02-09 19:01:37.428 [INFO][3315] k8s.go 591: Teardown processing complete. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.435453 env[1357]: time="2024-02-09T19:01:37.435414226Z" level=info msg="TearDown network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" successfully" Feb 9 19:01:37.435736 env[1357]: time="2024-02-09T19:01:37.435617770Z" level=info msg="StopPodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" returns successfully" Feb 9 19:01:37.437636 env[1357]: time="2024-02-09T19:01:37.437609054Z" level=info msg="RemovePodSandbox for \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" Feb 9 19:01:37.437760 env[1357]: time="2024-02-09T19:01:37.437724004Z" level=info msg="Forcibly stopping sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\"" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.513 [WARNING][3341] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"5521e8d7-dc6b-48f9-8cd1-0d9c07ee62ab", ResourceVersion:"1312", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"ea2ff1830e30124eedcd7a30ef2a93721574ea91bd833c5dbe30ed965ea182b5", Pod:"nginx-deployment-8ffc5cf85-gznrm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calibda91f5e4dc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.513 [INFO][3341] k8s.go 578: Cleaning up netns ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.513 [INFO][3341] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" iface="eth0" netns="" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.513 [INFO][3341] k8s.go 585: Releasing IP address(es) ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.513 [INFO][3341] utils.go 188: Calico CNI releasing IP address ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.530 [INFO][3347] ipam_plugin.go 415: Releasing address using handleID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.531 [INFO][3347] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.531 [INFO][3347] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.543 [WARNING][3347] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.543 [INFO][3347] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" HandleID="k8s-pod-network.9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Workload="10.200.20.10-k8s-nginx--deployment--8ffc5cf85--gznrm-eth0" Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.544 [INFO][3347] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:37.546379 env[1357]: 2024-02-09 19:01:37.545 [INFO][3341] k8s.go 591: Teardown processing complete. ContainerID="9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8" Feb 9 19:01:37.546856 env[1357]: time="2024-02-09T19:01:37.546821104Z" level=info msg="TearDown network for sandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" successfully" Feb 9 19:01:37.600340 env[1357]: time="2024-02-09T19:01:37.599140869Z" level=info msg="RemovePodSandbox \"9dc90b985049122c542c7abe1962f0f5365f25cc1b168b45d60083d3ad1287d8\" returns successfully" Feb 9 19:01:37.602717 env[1357]: time="2024-02-09T19:01:37.600922729Z" level=info msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.652 [WARNING][3365] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-csi--node--driver--6v5c6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee", ResourceVersion:"1349", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 0, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904", Pod:"csi-node-driver-6v5c6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia9dc9817088", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.652 [INFO][3365] k8s.go 578: Cleaning up netns ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.652 [INFO][3365] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" iface="eth0" netns="" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.652 [INFO][3365] k8s.go 585: Releasing IP address(es) ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.652 [INFO][3365] utils.go 188: Calico CNI releasing IP address ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.686 [INFO][3371] ipam_plugin.go 415: Releasing address using handleID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.686 [INFO][3371] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.687 [INFO][3371] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.702 [WARNING][3371] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.702 [INFO][3371] ipam_plugin.go 443: Releasing address using workloadID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.704 [INFO][3371] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:37.706358 env[1357]: 2024-02-09 19:01:37.705 [INFO][3365] k8s.go 591: Teardown processing complete. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.706805 env[1357]: time="2024-02-09T19:01:37.706378155Z" level=info msg="TearDown network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" successfully" Feb 9 19:01:37.706805 env[1357]: time="2024-02-09T19:01:37.706408432Z" level=info msg="StopPodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" returns successfully" Feb 9 19:01:37.707250 env[1357]: time="2024-02-09T19:01:37.707220248Z" level=info msg="RemovePodSandbox for \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" Feb 9 19:01:37.707320 env[1357]: time="2024-02-09T19:01:37.707257086Z" level=info msg="Forcibly stopping sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\"" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.769 [WARNING][3390] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-csi--node--driver--6v5c6-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7ca1d03f-54ad-4d21-90f1-86b69a28b6ee", ResourceVersion:"1349", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 0, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"b3dc740b0764970645fc730f34152d202fb9f1df6a48dc26e70cd0f967b60904", Pod:"csi-node-driver-6v5c6", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia9dc9817088", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.769 [INFO][3390] k8s.go 578: Cleaning up netns ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.769 [INFO][3390] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" iface="eth0" netns="" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.770 [INFO][3390] k8s.go 585: Releasing IP address(es) ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.770 [INFO][3390] utils.go 188: Calico CNI releasing IP address ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.798 [INFO][3396] ipam_plugin.go 415: Releasing address using handleID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.798 [INFO][3396] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.798 [INFO][3396] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.808 [WARNING][3396] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.808 [INFO][3396] ipam_plugin.go 443: Releasing address using workloadID ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" HandleID="k8s-pod-network.965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Workload="10.200.20.10-k8s-csi--node--driver--6v5c6-eth0" Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.809 [INFO][3396] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:01:37.811623 env[1357]: 2024-02-09 19:01:37.810 [INFO][3390] k8s.go 591: Teardown processing complete. ContainerID="965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443" Feb 9 19:01:37.812131 env[1357]: time="2024-02-09T19:01:37.812098440Z" level=info msg="TearDown network for sandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" successfully" Feb 9 19:01:37.854130 env[1357]: time="2024-02-09T19:01:37.852814677Z" level=info msg="RemovePodSandbox \"965f5839504f492ea84605eb5baa1e161d44b48759f44eea88b7ce45affcd443\" returns successfully" Feb 9 19:01:38.377298 kubelet[1905]: E0209 19:01:38.377197 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:39.377991 kubelet[1905]: E0209 19:01:39.377950 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:39.952159 env[1357]: time="2024-02-09T19:01:39.952115388Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:39.978056 env[1357]: time="2024-02-09T19:01:39.978017453Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:39.987187 env[1357]: time="2024-02-09T19:01:39.987159876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:40.000090 env[1357]: time="2024-02-09T19:01:40.000040533Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:01:40.001042 env[1357]: time="2024-02-09T19:01:40.001006260Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 9 19:01:40.002913 env[1357]: time="2024-02-09T19:01:40.002886078Z" level=info msg="CreateContainer within sandbox \"5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 9 19:01:40.052279 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4290008725.mount: Deactivated successfully. Feb 9 19:01:40.057511 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount721389996.mount: Deactivated successfully. Feb 9 19:01:40.095981 env[1357]: time="2024-02-09T19:01:40.095928130Z" level=info msg="CreateContainer within sandbox \"5f142d74f76f787ebdd836eac525c7c30636f1a1d60134570599b726b9d7fb18\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"67a39e192be33a4eebc2450fcaef61e742466b6a5150addd3dfd2b11586e26fd\"" Feb 9 19:01:40.096595 env[1357]: time="2024-02-09T19:01:40.096568202Z" level=info msg="StartContainer for \"67a39e192be33a4eebc2450fcaef61e742466b6a5150addd3dfd2b11586e26fd\"" Feb 9 19:01:40.119790 systemd[1]: Started cri-containerd-67a39e192be33a4eebc2450fcaef61e742466b6a5150addd3dfd2b11586e26fd.scope. Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.138219 kernel: kauditd_printk_skb: 148 callbacks suppressed Feb 9 19:01:40.138337 kernel: audit: type=1400 audit(1707505300.131:804): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.170527 kernel: audit: type=1400 audit(1707505300.131:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.189131 kernel: audit: type=1400 audit(1707505300.131:806): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.207348 kernel: audit: type=1400 audit(1707505300.131:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.224954 kernel: audit: type=1400 audit(1707505300.131:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.241932 kernel: audit: type=1400 audit(1707505300.131:809): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.263212 kernel: audit: type=1400 audit(1707505300.131:810): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.282790 kernel: audit: type=1400 audit(1707505300.131:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.301074 kernel: audit: type=1400 audit(1707505300.131:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.322567 kernel: audit: type=1400 audit(1707505300.131:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.131000 audit: BPF prog-id=113 op=LOAD Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3266 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637613339653139326265333361346565626332343530666361656636 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3266 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637613339653139326265333361346565626332343530666361656636 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.153000 audit: BPF prog-id=114 op=LOAD Feb 9 19:01:40.153000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3266 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637613339653139326265333361346565626332343530666361656636 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit: BPF prog-id=115 op=LOAD Feb 9 19:01:40.169000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3266 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637613339653139326265333361346565626332343530666361656636 Feb 9 19:01:40.169000 audit: BPF prog-id=115 op=UNLOAD Feb 9 19:01:40.169000 audit: BPF prog-id=114 op=UNLOAD Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { perfmon } for pid=3421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit[3421]: AVC avc: denied { bpf } for pid=3421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:01:40.169000 audit: BPF prog-id=116 op=LOAD Feb 9 19:01:40.169000 audit[3421]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3266 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:40.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637613339653139326265333361346565626332343530666361656636 Feb 9 19:01:40.333463 env[1357]: time="2024-02-09T19:01:40.333427533Z" level=info msg="StartContainer for \"67a39e192be33a4eebc2450fcaef61e742466b6a5150addd3dfd2b11586e26fd\" returns successfully" Feb 9 19:01:40.361000 audit[3449]: AVC avc: denied { search } for pid=3449 comm="rpcbind" name="crypto" dev="proc" ino=20785 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:01:40.361000 audit[3449]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff9cecf000 a2=0 a3=0 items=0 ppid=3432 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 key=(null) Feb 9 19:01:40.361000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 9 19:01:40.378808 kubelet[1905]: E0209 19:01:40.378746 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:40.406000 audit[3454]: AVC avc: denied { search } for pid=3454 comm="dbus-daemon" name="crypto" dev="proc" ino=20785 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:01:40.406000 audit[3454]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa38df000 a2=0 a3=0 items=0 ppid=3432 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 key=(null) Feb 9 19:01:40.406000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:01:40.408000 audit[3455]: AVC avc: denied { watch } for pid=3455 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c427,c894 tclass=dir permissive=0 Feb 9 19:01:40.408000 audit[3455]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaab5aca550 a2=2c8 a3=aaaab5ab8a60 items=0 ppid=3432 pid=3455 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 key=(null) Feb 9 19:01:40.408000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 9 19:01:40.414000 audit[3456]: AVC avc: denied { read } for pid=3456 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=22307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 9 19:01:40.414000 audit[3456]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffffa9d7a570 a2=80000 a3=0 items=0 ppid=3432 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 key=(null) Feb 9 19:01:40.414000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:01:40.415000 audit[3456]: AVC avc: denied { search } for pid=3456 comm="ganesha.nfsd" name="crypto" dev="proc" ino=20785 scontext=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 9 19:01:40.415000 audit[3456]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffa910f000 a2=0 a3=0 items=0 ppid=3432 pid=3456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c427,c894 key=(null) Feb 9 19:01:40.415000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 9 19:01:40.997797 kubelet[1905]: I0209 19:01:40.997762 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372027857046e+09 pod.CreationTimestamp="2024-02-09 19:01:32 +0000 UTC" firstStartedPulling="2024-02-09 19:01:33.421872311 +0000 UTC m=+56.565234483" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:01:40.997524175 +0000 UTC m=+64.140886387" watchObservedRunningTime="2024-02-09 19:01:40.99773052 +0000 UTC m=+64.141092692" Feb 9 19:01:41.037000 audit[3485]: NETFILTER_CFG table=filter:93 family=2 entries=18 op=nft_register_rule pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:41.037000 audit[3485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd0748ca0 a2=0 a3=ffffbe0806c0 items=0 ppid=2130 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:41.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:41.041000 audit[3485]: NETFILTER_CFG table=nat:94 family=2 entries=178 op=nft_register_chain pid=3485 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 9 19:01:41.041000 audit[3485]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffd0748ca0 a2=0 a3=ffffbe0806c0 items=0 ppid=2130 pid=3485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:01:41.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 9 19:01:41.379243 kubelet[1905]: E0209 19:01:41.379214 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:42.380256 kubelet[1905]: E0209 19:01:42.380223 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:43.381087 kubelet[1905]: E0209 19:01:43.381048 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:44.382093 kubelet[1905]: E0209 19:01:44.382066 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:45.383096 kubelet[1905]: E0209 19:01:45.383062 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:45.922893 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.dorIMT.mount: Deactivated successfully. Feb 9 19:01:46.383280 kubelet[1905]: E0209 19:01:46.383217 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:47.383575 kubelet[1905]: E0209 19:01:47.383544 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:48.384286 kubelet[1905]: E0209 19:01:48.384248 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:49.384605 kubelet[1905]: E0209 19:01:49.384572 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:50.385294 kubelet[1905]: E0209 19:01:50.385259 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:51.385733 kubelet[1905]: E0209 19:01:51.385705 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:52.386520 kubelet[1905]: E0209 19:01:52.386489 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:53.387297 kubelet[1905]: E0209 19:01:53.387264 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:54.388443 kubelet[1905]: E0209 19:01:54.388408 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:55.389022 kubelet[1905]: E0209 19:01:55.388987 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:56.389641 kubelet[1905]: E0209 19:01:56.389601 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:57.335120 kubelet[1905]: E0209 19:01:57.335094 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:57.390446 kubelet[1905]: E0209 19:01:57.390419 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:58.391041 kubelet[1905]: E0209 19:01:58.391004 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:01:59.391643 kubelet[1905]: E0209 19:01:59.391608 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:00.391803 kubelet[1905]: E0209 19:02:00.391761 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:01.392855 kubelet[1905]: E0209 19:02:01.392813 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:02.394149 kubelet[1905]: E0209 19:02:02.394116 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:03.394488 kubelet[1905]: E0209 19:02:03.394456 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:04.395538 kubelet[1905]: E0209 19:02:04.395506 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:05.395980 kubelet[1905]: E0209 19:02:05.395944 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:05.454417 kubelet[1905]: I0209 19:02:05.454389 1905 topology_manager.go:210] "Topology Admit Handler" Feb 9 19:02:05.458752 systemd[1]: Created slice kubepods-besteffort-pod2dfe9fb4_fa03_4422_88ee_9ef9f5353717.slice. Feb 9 19:02:05.603963 kubelet[1905]: I0209 19:02:05.603928 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-ef71fbe8-038a-4183-acc4-d6ae86cd9630\" (UniqueName: \"kubernetes.io/nfs/2dfe9fb4-fa03-4422-88ee-9ef9f5353717-pvc-ef71fbe8-038a-4183-acc4-d6ae86cd9630\") pod \"test-pod-1\" (UID: \"2dfe9fb4-fa03-4422-88ee-9ef9f5353717\") " pod="default/test-pod-1" Feb 9 19:02:05.604147 kubelet[1905]: I0209 19:02:05.603981 1905 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdhk4\" (UniqueName: \"kubernetes.io/projected/2dfe9fb4-fa03-4422-88ee-9ef9f5353717-kube-api-access-xdhk4\") pod \"test-pod-1\" (UID: \"2dfe9fb4-fa03-4422-88ee-9ef9f5353717\") " pod="default/test-pod-1" Feb 9 19:02:05.819000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.826233 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 9 19:02:05.826318 kernel: audit: type=1400 audit(1707505325.819:829): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.826351 kernel: Failed to create system directory netfs Feb 9 19:02:05.819000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.873051 kernel: audit: type=1400 audit(1707505325.819:829): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.873145 kernel: Failed to create system directory netfs Feb 9 19:02:05.877964 kernel: Failed to create system directory netfs Feb 9 19:02:05.878046 kernel: audit: type=1400 audit(1707505325.819:829): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.819000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.900837 kernel: Failed to create system directory netfs Feb 9 19:02:05.900927 kernel: audit: type=1400 audit(1707505325.819:829): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.819000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.819000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf91b25e0 a1=12c14 a2=aaaadecbe028 a3=aaaaf91a3010 items=0 ppid=70 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:05.945369 kernel: audit: type=1300 audit(1707505325.819:829): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf91b25e0 a1=12c14 a2=aaaadecbe028 a3=aaaaf91a3010 items=0 ppid=70 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:05.819000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:05.955595 kernel: audit: type=1327 audit(1707505325.819:829): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.985394 kernel: Failed to create system directory fscache Feb 9 19:02:05.985478 kernel: audit: type=1400 audit(1707505325.959:830): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.985504 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.008484 kernel: audit: type=1400 audit(1707505325.959:830): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.008571 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.031544 kernel: audit: type=1400 audit(1707505325.959:830): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.031629 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.055420 kernel: audit: type=1400 audit(1707505325.959:830): avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.055516 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.064949 kernel: Failed to create system directory fscache Feb 9 19:02:06.065010 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.073778 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.078134 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.086823 kernel: Failed to create system directory fscache Feb 9 19:02:06.086882 kernel: Failed to create system directory fscache Feb 9 19:02:06.086910 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.095651 kernel: Failed to create system directory fscache Feb 9 19:02:05.959000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.099943 kernel: Failed to create system directory fscache Feb 9 19:02:06.103226 kernel: FS-Cache: Loaded Feb 9 19:02:05.959000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf93c5210 a1=4c344 a2=aaaadecbe028 a3=aaaaf91a3010 items=0 ppid=70 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:05.959000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.191896 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.191949 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.191973 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.200287 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.200322 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.208414 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.208464 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.216780 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.216824 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.220976 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.225111 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.233244 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.233275 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.241420 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.241467 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.249305 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.249382 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.253222 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.260888 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.260954 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.268860 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.268907 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.276645 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.276700 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.284823 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.284879 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.292920 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.292971 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.300578 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.300624 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.308437 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.308481 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.315815 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.315876 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.322940 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.326694 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.326747 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.333841 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.333912 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.341053 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.344899 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.344936 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.351936 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.351967 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.359176 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.359241 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.366554 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.370171 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.370256 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.377497 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.377554 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.384927 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.384968 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.392621 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.396198 kubelet[1905]: E0209 19:02:06.396147 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:06.396517 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.396555 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.403850 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.403921 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.410749 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.410867 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.417976 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.418009 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.425170 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.425257 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.432543 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.432597 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.439801 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.439839 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.447219 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.447290 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.454368 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.454424 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.461382 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.461435 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.468757 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.468801 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.472248 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.475737 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.483079 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.483131 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.490286 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.490315 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.497599 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.501456 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.501490 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.508483 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.508515 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.516065 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.516103 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.519591 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.523171 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.530834 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.530879 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.538061 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.538112 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.545287 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.545335 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.552661 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.552706 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.556237 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.563729 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.563779 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.570760 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.570814 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.578380 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.578411 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.585448 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.585504 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.588921 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.592523 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.596155 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.603704 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.603749 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.607252 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.610994 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.617927 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.617981 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.621396 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.624981 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.632054 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.632097 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.635625 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.639272 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.646441 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.646488 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.650093 kernel: Failed to create system directory sunrpc Feb 9 19:02:06.178000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.665567 kernel: RPC: Registered named UNIX socket transport module. Feb 9 19:02:06.665677 kernel: RPC: Registered udp transport module. Feb 9 19:02:06.665710 kernel: RPC: Registered tcp transport module. Feb 9 19:02:06.673713 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 9 19:02:06.178000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf9411560 a1=fbb6c a2=aaaadecbe028 a3=aaaaf91a3010 items=6 ppid=70 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.178000 audit: CWD cwd="/" Feb 9 19:02:06.178000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PATH item=1 name=(null) inode=21111 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PATH item=2 name=(null) inode=21111 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PATH item=3 name=(null) inode=21112 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PATH item=4 name=(null) inode=21111 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PATH item=5 name=(null) inode=21113 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 9 19:02:06.178000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.832689 kernel: Failed to create system directory nfs Feb 9 19:02:06.832816 kernel: Failed to create system directory nfs Feb 9 19:02:06.832849 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.836405 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.843165 kernel: Failed to create system directory nfs Feb 9 19:02:06.843296 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.850074 kernel: Failed to create system directory nfs Feb 9 19:02:06.850120 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.856787 kernel: Failed to create system directory nfs Feb 9 19:02:06.856832 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.860265 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.867364 kernel: Failed to create system directory nfs Feb 9 19:02:06.867445 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.874140 kernel: Failed to create system directory nfs Feb 9 19:02:06.874182 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.881327 kernel: Failed to create system directory nfs Feb 9 19:02:06.881422 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.888077 kernel: Failed to create system directory nfs Feb 9 19:02:06.888116 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.894859 kernel: Failed to create system directory nfs Feb 9 19:02:06.894891 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.901665 kernel: Failed to create system directory nfs Feb 9 19:02:06.901741 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.908577 kernel: Failed to create system directory nfs Feb 9 19:02:06.908644 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.915475 kernel: Failed to create system directory nfs Feb 9 19:02:06.915534 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.922133 kernel: Failed to create system directory nfs Feb 9 19:02:06.922226 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.925634 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.932692 kernel: Failed to create system directory nfs Feb 9 19:02:06.932737 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.939580 kernel: Failed to create system directory nfs Feb 9 19:02:06.939631 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.946336 kernel: Failed to create system directory nfs Feb 9 19:02:06.946381 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.949772 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.953150 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.960302 kernel: Failed to create system directory nfs Feb 9 19:02:06.960359 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.966983 kernel: Failed to create system directory nfs Feb 9 19:02:06.967032 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.973901 kernel: Failed to create system directory nfs Feb 9 19:02:06.973945 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.980930 kernel: Failed to create system directory nfs Feb 9 19:02:06.981258 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.988474 kernel: Failed to create system directory nfs Feb 9 19:02:06.988528 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.995287 kernel: Failed to create system directory nfs Feb 9 19:02:06.995339 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.002419 kernel: Failed to create system directory nfs Feb 9 19:02:07.002464 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.005839 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.009398 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.016171 kernel: Failed to create system directory nfs Feb 9 19:02:07.016246 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.019594 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.022963 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.026338 kernel: Failed to create system directory nfs Feb 9 19:02:06.821000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:06.821000 audit[3542]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf953db40 a1=ae35c a2=aaaadecbe028 a3=aaaaf91a3010 items=0 ppid=70 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:06.821000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 9 19:02:07.043263 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.119396 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.119472 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.119501 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.126268 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.126300 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.133586 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.133631 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.140957 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.140990 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.149104 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.149173 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.156494 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.156547 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.160234 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.167685 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.167739 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.171260 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.178440 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.178473 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.185488 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.185553 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.189240 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.192992 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.196580 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.203725 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.203772 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.207362 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.210987 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.218453 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.218544 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.222021 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.229248 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.229304 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.232782 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.236258 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.243384 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.243426 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.250131 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.250183 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.257125 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.257159 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.264136 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.267611 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.271484 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.271513 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.278259 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.278311 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.285042 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.285076 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.289229 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.293294 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.296744 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.303766 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.303795 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.307271 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.310703 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.314282 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.321430 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.325103 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.325163 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.331893 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.331944 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.335413 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.338878 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.345624 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.345673 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.349111 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.352877 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.356292 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.359707 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.363250 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.370627 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.370715 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.377974 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.378023 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.385022 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.385073 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.391780 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.391827 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.396931 kubelet[1905]: E0209 19:02:07.396880 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:07.398900 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.399002 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.406045 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.406078 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.413376 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.413439 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.416832 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.420459 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.424025 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.431314 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.431370 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.434763 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.441763 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.441866 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.107000 audit[3547]: AVC avc: denied { confidentiality } for pid=3547 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.448868 kernel: Failed to create system directory nfs4 Feb 9 19:02:07.558491 kernel: NFS: Registering the id_resolver key type Feb 9 19:02:07.558612 kernel: Key type id_resolver registered Feb 9 19:02:07.558648 kernel: Key type id_legacy registered Feb 9 19:02:07.107000 audit[3547]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff9afab010 a1=167c04 a2=aaaae698e028 a3=aaaaf2766010 items=0 ppid=70 pid=3547 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.107000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.616484 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.616524 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.616539 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.624020 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.624106 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.631276 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.631324 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.638088 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.643022 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.648273 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.657827 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.657877 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.657913 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.665463 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.665545 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.672590 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.672619 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.679688 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.679715 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.686863 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.686927 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.694164 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.694243 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.701914 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.705617 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: AVC avc: denied { confidentiality } for pid=3548 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 9 19:02:07.709173 kernel: Failed to create system directory rpcgss Feb 9 19:02:07.607000 audit[3548]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb58a3010 a1=3e09c a2=aaaacd8be028 a3=aaaae414a010 items=0 ppid=70 pid=3548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:07.607000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 9 19:02:08.187765 nfsidmap[3556]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-c004c0b513' Feb 9 19:02:08.196996 nfsidmap[3557]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-c004c0b513' Feb 9 19:02:08.212000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad5b73920 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.212000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:08.212000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad5b73920 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.212000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:08.212000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2764 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 9 19:02:08.212000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad5b73920 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.212000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 9 19:02:08.397168 kubelet[1905]: E0209 19:02:08.397127 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:08.462735 env[1357]: time="2024-02-09T19:02:08.462032324Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2dfe9fb4-fa03-4422-88ee-9ef9f5353717,Namespace:default,Attempt:0,}" Feb 9 19:02:08.639375 systemd-networkd[1499]: cali5ec59c6bf6e: Link UP Feb 9 19:02:08.646380 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 9 19:02:08.646478 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 9 19:02:08.648472 systemd-networkd[1499]: cali5ec59c6bf6e: Gained carrier Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.573 [INFO][3558] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.10-k8s-test--pod--1-eth0 default 2dfe9fb4-fa03-4422-88ee-9ef9f5353717 1455 0 2024-02-09 19:01:33 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.10 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.573 [INFO][3558] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.598 [INFO][3570] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" HandleID="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Workload="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.610 [INFO][3570] ipam_plugin.go 268: Auto assigning IP ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" HandleID="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Workload="10.200.20.10-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004ff380), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.10", "pod":"test-pod-1", "timestamp":"2024-02-09 19:02:08.598936141 +0000 UTC"}, Hostname:"10.200.20.10", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.610 [INFO][3570] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.610 [INFO][3570] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.611 [INFO][3570] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.10' Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.612 [INFO][3570] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.615 [INFO][3570] ipam.go 372: Looking up existing affinities for host host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.618 [INFO][3570] ipam.go 489: Trying affinity for 192.168.83.128/26 host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.619 [INFO][3570] ipam.go 155: Attempting to load block cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.621 [INFO][3570] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.128/26 host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.621 [INFO][3570] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.128/26 handle="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.622 [INFO][3570] ipam.go 1682: Creating new handle: k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07 Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.625 [INFO][3570] ipam.go 1203: Writing block in order to claim IPs block=192.168.83.128/26 handle="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.631 [INFO][3570] ipam.go 1216: Successfully claimed IPs: [192.168.83.132/26] block=192.168.83.128/26 handle="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.631 [INFO][3570] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.132/26] handle="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" host="10.200.20.10" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.631 [INFO][3570] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.631 [INFO][3570] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.83.132/26] IPv6=[] ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" HandleID="k8s-pod-network.53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Workload="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.633 [INFO][3558] k8s.go 385: Populated endpoint ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2dfe9fb4-fa03-4422-88ee-9ef9f5353717", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:08.655972 env[1357]: 2024-02-09 19:02:08.633 [INFO][3558] k8s.go 386: Calico CNI using IPs: [192.168.83.132/32] ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.656577 env[1357]: 2024-02-09 19:02:08.633 [INFO][3558] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.656577 env[1357]: 2024-02-09 19:02:08.649 [INFO][3558] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.656577 env[1357]: 2024-02-09 19:02:08.649 [INFO][3558] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.10-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"2dfe9fb4-fa03-4422-88ee-9ef9f5353717", ResourceVersion:"1455", Generation:0, CreationTimestamp:time.Date(2024, time.February, 9, 19, 1, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.10", ContainerID:"53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.83.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"c2:0d:3d:fc:0b:bc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 9 19:02:08.656577 env[1357]: 2024-02-09 19:02:08.654 [INFO][3558] k8s.go 491: Wrote updated endpoint to datastore ContainerID="53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.10-k8s-test--pod--1-eth0" Feb 9 19:02:08.667000 audit[3591]: NETFILTER_CFG table=filter:95 family=2 entries=38 op=nft_register_chain pid=3591 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 9 19:02:08.667000 audit[3591]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19080 a0=3 a1=ffffd9416710 a2=0 a3=ffffb38b9fa8 items=0 ppid=2631 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.667000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 9 19:02:08.680541 env[1357]: time="2024-02-09T19:02:08.680478600Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 9 19:02:08.680680 env[1357]: time="2024-02-09T19:02:08.680516318Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 9 19:02:08.680680 env[1357]: time="2024-02-09T19:02:08.680526518Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 9 19:02:08.680785 env[1357]: time="2024-02-09T19:02:08.680705708Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07 pid=3600 runtime=io.containerd.runc.v2 Feb 9 19:02:08.694149 systemd[1]: Started cri-containerd-53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07.scope. Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.705000 audit: BPF prog-id=117 op=LOAD Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3600 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646336386530633165313163323138343330313331643936643337 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3600 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646336386530633165313163323138343330313331643936643337 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit: BPF prog-id=118 op=LOAD Feb 9 19:02:08.706000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3600 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646336386530633165313163323138343330313331643936643337 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit: BPF prog-id=119 op=LOAD Feb 9 19:02:08.706000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3600 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646336386530633165313163323138343330313331643936643337 Feb 9 19:02:08.706000 audit: BPF prog-id=119 op=UNLOAD Feb 9 19:02:08.706000 audit: BPF prog-id=118 op=UNLOAD Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { perfmon } for pid=3611 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit[3611]: AVC avc: denied { bpf } for pid=3611 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:08.706000 audit: BPF prog-id=120 op=LOAD Feb 9 19:02:08.706000 audit[3611]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3600 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:08.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533646336386530633165313163323138343330313331643936643337 Feb 9 19:02:08.725229 env[1357]: time="2024-02-09T19:02:08.725122300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:2dfe9fb4-fa03-4422-88ee-9ef9f5353717,Namespace:default,Attempt:0,} returns sandbox id \"53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07\"" Feb 9 19:02:08.727132 env[1357]: time="2024-02-09T19:02:08.727106432Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 9 19:02:09.130616 env[1357]: time="2024-02-09T19:02:09.130559256Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:09.145617 env[1357]: time="2024-02-09T19:02:09.145574689Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:09.154945 env[1357]: time="2024-02-09T19:02:09.154908827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:09.162067 env[1357]: time="2024-02-09T19:02:09.162030644Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 9 19:02:09.162609 env[1357]: time="2024-02-09T19:02:09.162579374Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 9 19:02:09.166859 env[1357]: time="2024-02-09T19:02:09.166651915Z" level=info msg="CreateContainer within sandbox \"53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 9 19:02:09.226813 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1928247162.mount: Deactivated successfully. Feb 9 19:02:09.232773 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3743423187.mount: Deactivated successfully. Feb 9 19:02:09.268153 env[1357]: time="2024-02-09T19:02:09.268103061Z" level=info msg="CreateContainer within sandbox \"53dc68e0c1e11c218430131d96d37719aacc2d7def21b8358b05647400dc5c07\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"082dc01c993367b28b4958343caaffa56fcff93acc8420682b5cb47764e73314\"" Feb 9 19:02:09.268630 env[1357]: time="2024-02-09T19:02:09.268604794Z" level=info msg="StartContainer for \"082dc01c993367b28b4958343caaffa56fcff93acc8420682b5cb47764e73314\"" Feb 9 19:02:09.282605 systemd[1]: Started cri-containerd-082dc01c993367b28b4958343caaffa56fcff93acc8420682b5cb47764e73314.scope. Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.293000 audit: BPF prog-id=121 op=LOAD Feb 9 19:02:09.294000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.294000 audit[3642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3600 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:09.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038326463303163393933333637623238623439353833343363616166 Feb 9 19:02:09.294000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.294000 audit[3642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3600 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:09.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038326463303163393933333637623238623439353833343363616166 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit: BPF prog-id=122 op=LOAD Feb 9 19:02:09.295000 audit[3642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3600 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:09.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038326463303163393933333637623238623439353833343363616166 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.295000 audit: BPF prog-id=123 op=LOAD Feb 9 19:02:09.295000 audit[3642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3600 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:09.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038326463303163393933333637623238623439353833343363616166 Feb 9 19:02:09.296000 audit: BPF prog-id=123 op=UNLOAD Feb 9 19:02:09.296000 audit: BPF prog-id=122 op=UNLOAD Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { perfmon } for pid=3642 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit[3642]: AVC avc: denied { bpf } for pid=3642 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 9 19:02:09.296000 audit: BPF prog-id=124 op=LOAD Feb 9 19:02:09.296000 audit[3642]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3600 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 9 19:02:09.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038326463303163393933333637623238623439353833343363616166 Feb 9 19:02:09.326786 env[1357]: time="2024-02-09T19:02:09.326749748Z" level=info msg="StartContainer for \"082dc01c993367b28b4958343caaffa56fcff93acc8420682b5cb47764e73314\" returns successfully" Feb 9 19:02:09.397713 kubelet[1905]: E0209 19:02:09.397601 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:09.804367 systemd-networkd[1499]: cali5ec59c6bf6e: Gained IPv6LL Feb 9 19:02:10.055150 kubelet[1905]: I0209 19:02:10.054845 1905 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.223371999799976e+09 pod.CreationTimestamp="2024-02-09 19:01:33 +0000 UTC" firstStartedPulling="2024-02-09 19:02:08.726517464 +0000 UTC m=+91.869879676" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-09 19:02:10.054575561 +0000 UTC m=+93.197937773" watchObservedRunningTime="2024-02-09 19:02:10.054799229 +0000 UTC m=+93.198161401" Feb 9 19:02:10.398082 kubelet[1905]: E0209 19:02:10.398048 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:11.399166 kubelet[1905]: E0209 19:02:11.399130 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:12.400657 kubelet[1905]: E0209 19:02:12.400619 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:13.401579 kubelet[1905]: E0209 19:02:13.401542 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:14.402271 kubelet[1905]: E0209 19:02:14.402239 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:15.403648 kubelet[1905]: E0209 19:02:15.403616 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:15.922446 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.xQ0Czt.mount: Deactivated successfully. Feb 9 19:02:16.404671 kubelet[1905]: E0209 19:02:16.404646 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:17.335236 kubelet[1905]: E0209 19:02:17.335192 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:17.405730 kubelet[1905]: E0209 19:02:17.405699 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:18.406703 kubelet[1905]: E0209 19:02:18.406668 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:19.407038 kubelet[1905]: E0209 19:02:19.407003 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:20.407863 kubelet[1905]: E0209 19:02:20.407829 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:21.408246 kubelet[1905]: E0209 19:02:21.408196 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:22.408748 kubelet[1905]: E0209 19:02:22.408666 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:23.408801 kubelet[1905]: E0209 19:02:23.408762 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:24.409177 kubelet[1905]: E0209 19:02:24.409129 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:25.409853 kubelet[1905]: E0209 19:02:25.409813 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:25.783323 kubelet[1905]: E0209 19:02:25.783226 1905 controller.go:189] failed to update lease, error: rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.14:50308->10.200.20.12:2379: read: connection timed out Feb 9 19:02:26.410451 kubelet[1905]: E0209 19:02:26.410416 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:27.411384 kubelet[1905]: E0209 19:02:27.411343 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:28.412400 kubelet[1905]: E0209 19:02:28.412360 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:29.412707 kubelet[1905]: E0209 19:02:29.412675 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:30.413792 kubelet[1905]: E0209 19:02:30.413761 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:31.414537 kubelet[1905]: E0209 19:02:31.414500 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:32.415347 kubelet[1905]: E0209 19:02:32.415311 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:33.416429 kubelet[1905]: E0209 19:02:33.416378 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:34.416853 kubelet[1905]: E0209 19:02:34.416815 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:35.417581 kubelet[1905]: E0209 19:02:35.417546 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:35.784241 kubelet[1905]: E0209 19:02:35.784011 1905 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:36.418222 kubelet[1905]: E0209 19:02:36.418174 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:37.335292 kubelet[1905]: E0209 19:02:37.335260 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:37.419437 kubelet[1905]: E0209 19:02:37.419407 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:38.420669 kubelet[1905]: E0209 19:02:38.420637 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:39.421867 kubelet[1905]: E0209 19:02:39.421819 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:40.422306 kubelet[1905]: E0209 19:02:40.422276 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:41.423738 kubelet[1905]: E0209 19:02:41.423703 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:42.423990 kubelet[1905]: E0209 19:02:42.423958 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:43.424897 kubelet[1905]: E0209 19:02:43.424862 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:44.425633 kubelet[1905]: E0209 19:02:44.425595 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:45.426580 kubelet[1905]: E0209 19:02:45.426520 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:45.785259 kubelet[1905]: E0209 19:02:45.784882 1905 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:45.924615 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.d09rDc.mount: Deactivated successfully. Feb 9 19:02:46.427501 kubelet[1905]: E0209 19:02:46.427467 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:47.427787 kubelet[1905]: E0209 19:02:47.427738 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:48.428198 kubelet[1905]: E0209 19:02:48.428166 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:49.429001 kubelet[1905]: E0209 19:02:49.428959 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:50.430495 kubelet[1905]: E0209 19:02:50.430465 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:51.431869 kubelet[1905]: E0209 19:02:51.431840 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:52.432535 kubelet[1905]: E0209 19:02:52.432507 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:53.433790 kubelet[1905]: E0209 19:02:53.433751 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:54.434018 kubelet[1905]: E0209 19:02:54.433982 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:55.435144 kubelet[1905]: E0209 19:02:55.435115 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:55.785624 kubelet[1905]: E0209 19:02:55.785509 1905 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:02:56.436380 kubelet[1905]: E0209 19:02:56.436351 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:57.334900 kubelet[1905]: E0209 19:02:57.334866 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:57.437661 kubelet[1905]: E0209 19:02:57.437632 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:58.438440 kubelet[1905]: E0209 19:02:58.438405 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:02:59.439627 kubelet[1905]: E0209 19:02:59.439587 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:00.440350 kubelet[1905]: E0209 19:03:00.440319 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:01.441027 kubelet[1905]: E0209 19:03:01.440992 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:02.442357 kubelet[1905]: E0209 19:03:02.442324 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:03.443276 kubelet[1905]: E0209 19:03:03.443228 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:04.444395 kubelet[1905]: E0209 19:03:04.444350 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:05.444677 kubelet[1905]: E0209 19:03:05.444640 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:05.787008 kubelet[1905]: E0209 19:03:05.786691 1905 controller.go:189] failed to update lease, error: Put "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:03:05.787008 kubelet[1905]: I0209 19:03:05.786730 1905 controller.go:116] failed to update lease using latest lease, fallback to ensure lease, err: failed 5 attempts to update lease Feb 9 19:03:06.445514 kubelet[1905]: E0209 19:03:06.445483 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:07.446895 kubelet[1905]: E0209 19:03:07.446862 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:08.447036 kubelet[1905]: E0209 19:03:08.446997 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:09.447850 kubelet[1905]: E0209 19:03:09.447817 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:10.448044 kubelet[1905]: E0209 19:03:10.448013 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:11.449226 kubelet[1905]: E0209 19:03:11.449185 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:12.450442 kubelet[1905]: E0209 19:03:12.450411 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:13.314487 kubelet[1905]: E0209 19:03:13.314448 1905 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.10\": Get \"https://10.200.20.14:6443/api/v1/nodes/10.200.20.10?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:03:13.451237 kubelet[1905]: E0209 19:03:13.451189 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:14.451615 kubelet[1905]: E0209 19:03:14.451570 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:15.452217 kubelet[1905]: E0209 19:03:15.452181 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:15.787318 kubelet[1905]: E0209 19:03:15.786969 1905 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:03:15.923015 systemd[1]: run-containerd-runc-k8s.io-84e84d403c315f9cd1cecaabf40d869f2e0de4a122fa9c83c5224e2a875dca18-runc.9p3Mzu.mount: Deactivated successfully. Feb 9 19:03:16.453336 kubelet[1905]: E0209 19:03:16.453274 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:17.335883 kubelet[1905]: E0209 19:03:17.335841 1905 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:17.454316 kubelet[1905]: E0209 19:03:17.454284 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:17.617521 update_engine[1344]: I0209 19:03:17.617314 1344 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Feb 9 19:03:17.617521 update_engine[1344]: I0209 19:03:17.617354 1344 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Feb 9 19:03:17.617521 update_engine[1344]: I0209 19:03:17.617463 1344 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Feb 9 19:03:17.618732 update_engine[1344]: I0209 19:03:17.618484 1344 omaha_request_params.cc:62] Current group set to lts Feb 9 19:03:17.618732 update_engine[1344]: I0209 19:03:17.618582 1344 update_attempter.cc:499] Already updated boot flags. Skipping. Feb 9 19:03:17.618732 update_engine[1344]: I0209 19:03:17.618587 1344 update_attempter.cc:643] Scheduling an action processor start. Feb 9 19:03:17.618732 update_engine[1344]: I0209 19:03:17.618602 1344 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Feb 9 19:03:17.618732 update_engine[1344]: I0209 19:03:17.618625 1344 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Feb 9 19:03:17.619000 locksmithd[1432]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Feb 9 19:03:17.619566 update_engine[1344]: I0209 19:03:17.619540 1344 omaha_request_action.cc:270] Posting an Omaha request to disabled Feb 9 19:03:17.619566 update_engine[1344]: I0209 19:03:17.619561 1344 omaha_request_action.cc:271] Request: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619566 update_engine[1344]: Feb 9 19:03:17.619798 update_engine[1344]: I0209 19:03:17.619570 1344 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:03:17.620539 update_engine[1344]: I0209 19:03:17.620401 1344 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:03:17.620610 update_engine[1344]: I0209 19:03:17.620600 1344 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:03:17.730994 update_engine[1344]: E0209 19:03:17.730942 1344 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:03:17.731137 update_engine[1344]: I0209 19:03:17.731067 1344 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Feb 9 19:03:18.454942 kubelet[1905]: E0209 19:03:18.454894 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:19.455520 kubelet[1905]: E0209 19:03:19.455487 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:20.455737 kubelet[1905]: E0209 19:03:20.455703 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:21.455854 kubelet[1905]: E0209 19:03:21.455820 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:22.455973 kubelet[1905]: E0209 19:03:22.455935 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:23.315121 kubelet[1905]: E0209 19:03:23.315082 1905 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.10\": Get \"https://10.200.20.14:6443/api/v1/nodes/10.200.20.10?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 9 19:03:23.456719 kubelet[1905]: E0209 19:03:23.456685 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:24.457968 kubelet[1905]: E0209 19:03:24.457928 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:25.458958 kubelet[1905]: E0209 19:03:25.458922 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:25.988257 kubelet[1905]: E0209 19:03:25.988197 1905 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.10?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 9 19:03:26.459995 kubelet[1905]: E0209 19:03:26.459952 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:27.460288 kubelet[1905]: E0209 19:03:27.460244 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:27.564326 update_engine[1344]: I0209 19:03:27.564273 1344 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Feb 9 19:03:27.564607 update_engine[1344]: I0209 19:03:27.564479 1344 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Feb 9 19:03:27.564677 update_engine[1344]: I0209 19:03:27.564651 1344 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Feb 9 19:03:27.632898 update_engine[1344]: E0209 19:03:27.632853 1344 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Feb 9 19:03:27.633035 update_engine[1344]: I0209 19:03:27.632992 1344 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Feb 9 19:03:28.039500 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.055758 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.071027 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.087226 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.101609 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.116829 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.117042 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.139890 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.140109 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.140261 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.156977 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.157240 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.173295 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.173469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.188986 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.189582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.205045 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.205385 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.221250 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.229438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.229618 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.252533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.252736 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.252847 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.268635 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.268841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.284838 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.285009 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.300423 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.300600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.315727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.316036 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.331246 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.346540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.358366 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.358544 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.358648 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.369499 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.369645 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.385703 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.385897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.402489 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.402687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.418074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.418321 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.433355 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.433559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.448882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.449075 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.460718 kubelet[1905]: E0209 19:03:28.460676 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:28.464048 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.464236 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.480051 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.497125 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.497324 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.497428 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.512608 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.512809 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.528811 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.529046 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.545101 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.545345 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.560602 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.560795 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.575901 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.598369 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.598497 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.598597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.606434 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.614154 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.629430 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.644793 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.656520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.656640 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.656762 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.656861 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.668837 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.669016 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.684659 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.684901 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.700461 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.700600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.723422 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.723658 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.723811 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.739420 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.739635 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.754741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.781309 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.781444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.781547 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.781641 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.793516 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833237 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833495 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833616 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833719 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.833945 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.842033 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.857653 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.857858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.881562 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.897083 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.955636 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.955801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.955907 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956264 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956384 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956491 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956593 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.956694 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.964450 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.979819 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.980019 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.995843 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:28.996034 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.011344 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.011526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.018746 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.027572 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.035503 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.043754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.051741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.062731 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.071136 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.080008 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.088278 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.097049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.105382 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.113494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.121705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.129894 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.138266 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.146389 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.155405 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.163348 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.171315 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.179467 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.186845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.194708 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.202786 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.210464 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.219031 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.227065 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.235178 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.243392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.251248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.258948 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.267135 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.275169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.283356 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.291341 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.300183 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.308541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.316845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.325393 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.333733 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.341675 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.349676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.357864 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.365887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.373911 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.382133 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.390399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.398595 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.407381 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.415598 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.423533 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.431306 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.439616 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.447469 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.455696 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.460878 kubelet[1905]: E0209 19:03:29.460795 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:29.463788 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.471660 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.479487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.487455 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.495897 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.503832 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.512120 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.520711 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.528983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.536992 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.545378 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.553274 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.561545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.569986 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.578898 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.587100 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.595419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.604096 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.612734 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.621182 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.630133 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.638543 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.647094 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.655642 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.664156 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.672614 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.680539 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.688471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.696831 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.705218 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.713548 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.721970 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.729885 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.738719 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.746492 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.754438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.762445 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.771121 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.779427 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.787601 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.795561 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.803729 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.811729 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.820011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.827904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.835962 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.843887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.852018 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.860272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.868397 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.876591 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.884967 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.893164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.900759 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.908962 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.918015 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.929436 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.940147 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.949679 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.960215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.968549 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.977510 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.985913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:29.994555 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.002944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.011286 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.019811 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.027866 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.036044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.044327 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.054582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.063267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.071113 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.079392 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.087216 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.095267 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.103554 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.112349 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.121024 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.129506 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.137357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.146057 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.154662 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.162971 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.171295 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.180087 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.188110 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.196215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.203943 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.212354 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.220687 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.228617 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.236775 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.244754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.252718 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.260599 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.268680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.276702 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.284783 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.292564 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.300400 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.308451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.316462 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.326047 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.333862 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.342583 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.350680 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.358313 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.366438 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.374111 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.382493 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.390146 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.397985 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.405653 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.413644 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.421506 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.434343 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.441806 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.449597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.457146 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.461361 kubelet[1905]: E0209 19:03:30.461309 1905 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 9 19:03:30.465070 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.472904 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.481241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.489163 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.497764 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.505858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.513703 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.521351 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.529555 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.537375 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.545272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.553386 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.561357 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.569141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.576950 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.584610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.592586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.600241 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.608872 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.617096 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.626253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.634796 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.642403 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.650472 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.658461 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.666668 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.674804 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.682720 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.690399 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.698583 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.706199 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#261 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 9 19:03:30.714391 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#260 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001