Feb 12 19:18:22.023371 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:18:22.023390 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:18:22.023398 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:18:22.023405 kernel: printk: bootconsole [pl11] enabled Feb 12 19:18:22.023410 kernel: efi: EFI v2.70 by EDK II Feb 12 19:18:22.023415 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:18:22.023422 kernel: random: crng init done Feb 12 19:18:22.023427 kernel: ACPI: Early table checksum verification disabled Feb 12 19:18:22.023433 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:18:22.023438 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023443 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023450 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:18:22.023455 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023461 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023467 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023473 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023479 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023486 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023492 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:18:22.023497 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:18:22.023503 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:18:22.023509 kernel: NUMA: Failed to initialise from firmware Feb 12 19:18:22.023514 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:18:22.023520 kernel: NUMA: NODE_DATA [mem 0x1bf7f0900-0x1bf7f5fff] Feb 12 19:18:22.023526 kernel: Zone ranges: Feb 12 19:18:22.023532 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:18:22.023537 kernel: DMA32 empty Feb 12 19:18:22.023544 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:18:22.023550 kernel: Movable zone start for each node Feb 12 19:18:22.023555 kernel: Early memory node ranges Feb 12 19:18:22.023561 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:18:22.023567 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:18:22.023572 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:18:22.023578 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:18:22.023583 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:18:22.023589 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:18:22.023594 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:18:22.023600 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:18:22.023606 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:18:22.023613 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:18:22.023621 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:18:22.023627 kernel: psci: probing for conduit method from ACPI. Feb 12 19:18:22.023633 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:18:22.023639 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:18:22.023646 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:18:22.023652 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:18:22.023658 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:18:22.023664 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:18:22.023670 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:18:22.023676 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:18:22.023682 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:18:22.023688 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:18:22.023694 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:18:22.023700 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:18:22.023706 kernel: CPU features: detected: Spectre-BHB Feb 12 19:18:22.023712 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:18:22.023719 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:18:22.023725 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:18:22.023731 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:18:22.023737 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:18:22.023743 kernel: Policy zone: Normal Feb 12 19:18:22.023751 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:18:22.023757 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:18:22.023763 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:18:22.023769 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:18:22.023776 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:18:22.023783 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:18:22.023789 kernel: Memory: 3991928K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202232K reserved, 0K cma-reserved) Feb 12 19:18:22.023796 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:18:22.023802 kernel: trace event string verifier disabled Feb 12 19:18:22.023807 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:18:22.023814 kernel: rcu: RCU event tracing is enabled. Feb 12 19:18:22.023820 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:18:22.023827 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:18:22.023833 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:18:22.023839 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:18:22.023845 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:18:22.023852 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:18:22.023858 kernel: GICv3: 960 SPIs implemented Feb 12 19:18:22.023864 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:18:22.023870 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:18:22.023876 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:18:22.023881 kernel: GICv3: 16 PPIs implemented Feb 12 19:18:22.023887 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:18:22.023893 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:18:22.023900 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:18:22.023906 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:18:22.023912 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:18:22.023918 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:18:22.023925 kernel: Console: colour dummy device 80x25 Feb 12 19:18:22.023932 kernel: printk: console [tty1] enabled Feb 12 19:18:22.023938 kernel: ACPI: Core revision 20210730 Feb 12 19:18:22.023945 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:18:22.023951 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:18:22.023957 kernel: LSM: Security Framework initializing Feb 12 19:18:22.023963 kernel: SELinux: Initializing. Feb 12 19:18:22.023969 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:18:22.023976 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:18:22.023983 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:18:22.023990 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:18:22.023996 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:18:22.024002 kernel: Remapping and enabling EFI services. Feb 12 19:18:22.024008 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:18:22.024014 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:18:22.024020 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:18:22.024027 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:18:22.024033 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:18:22.024040 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:18:22.024046 kernel: SMP: Total of 2 processors activated. Feb 12 19:18:22.024053 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:18:22.024059 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:18:22.024066 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:18:22.024084 kernel: CPU features: detected: CRC32 instructions Feb 12 19:18:22.024090 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:18:22.024096 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:18:22.024103 kernel: CPU features: detected: Privileged Access Never Feb 12 19:18:22.024110 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:18:22.024117 kernel: alternatives: patching kernel code Feb 12 19:18:22.024127 kernel: devtmpfs: initialized Feb 12 19:18:22.024135 kernel: KASLR enabled Feb 12 19:18:22.024141 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:18:22.024148 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:18:22.024154 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:18:22.024161 kernel: SMBIOS 3.1.0 present. Feb 12 19:18:22.024168 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:18:22.024174 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:18:22.024182 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:18:22.024188 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:18:22.024195 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:18:22.024202 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:18:22.024208 kernel: audit: type=2000 audit(0.089:1): state=initialized audit_enabled=0 res=1 Feb 12 19:18:22.024215 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:18:22.024221 kernel: cpuidle: using governor menu Feb 12 19:18:22.024229 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:18:22.024236 kernel: ASID allocator initialised with 32768 entries Feb 12 19:18:22.024242 kernel: ACPI: bus type PCI registered Feb 12 19:18:22.024249 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:18:22.024255 kernel: Serial: AMBA PL011 UART driver Feb 12 19:18:22.024262 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:18:22.024268 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:18:22.024275 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:18:22.024281 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:18:22.024289 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:18:22.024295 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:18:22.024302 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:18:22.024308 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:18:22.024315 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:18:22.024321 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:18:22.024328 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:18:22.024334 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:18:22.024341 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:18:22.024349 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:18:22.024355 kernel: ACPI: Interpreter enabled Feb 12 19:18:22.024362 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:18:22.024368 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:18:22.024375 kernel: printk: console [ttyAMA0] enabled Feb 12 19:18:22.024381 kernel: printk: bootconsole [pl11] disabled Feb 12 19:18:22.024388 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:18:22.024394 kernel: iommu: Default domain type: Translated Feb 12 19:18:22.024401 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:18:22.024409 kernel: vgaarb: loaded Feb 12 19:18:22.024415 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:18:22.024422 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:18:22.024429 kernel: PTP clock support registered Feb 12 19:18:22.024435 kernel: Registered efivars operations Feb 12 19:18:22.024441 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:18:22.024448 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:18:22.024454 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:18:22.024461 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:18:22.024468 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:18:22.024475 kernel: pnp: PnP ACPI init Feb 12 19:18:22.024481 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:18:22.024488 kernel: NET: Registered PF_INET protocol family Feb 12 19:18:22.024494 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:18:22.024501 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:18:22.024508 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:18:22.024514 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:18:22.024521 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:18:22.024529 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:18:22.024536 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:18:22.024542 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:18:22.024549 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:18:22.024555 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:18:22.024562 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:18:22.024569 kernel: kvm [1]: HYP mode not available Feb 12 19:18:22.024575 kernel: Initialise system trusted keyrings Feb 12 19:18:22.024582 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:18:22.024589 kernel: Key type asymmetric registered Feb 12 19:18:22.024596 kernel: Asymmetric key parser 'x509' registered Feb 12 19:18:22.024602 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:18:22.024609 kernel: io scheduler mq-deadline registered Feb 12 19:18:22.024615 kernel: io scheduler kyber registered Feb 12 19:18:22.024621 kernel: io scheduler bfq registered Feb 12 19:18:22.024628 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:18:22.024634 kernel: thunder_xcv, ver 1.0 Feb 12 19:18:22.024641 kernel: thunder_bgx, ver 1.0 Feb 12 19:18:22.024649 kernel: nicpf, ver 1.0 Feb 12 19:18:22.024655 kernel: nicvf, ver 1.0 Feb 12 19:18:22.024769 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:18:22.024830 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:18:21 UTC (1707765501) Feb 12 19:18:22.024839 kernel: efifb: probing for efifb Feb 12 19:18:22.024846 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:18:22.024853 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:18:22.024859 kernel: efifb: scrolling: redraw Feb 12 19:18:22.024868 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:18:22.024875 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:18:22.024881 kernel: fb0: EFI VGA frame buffer device Feb 12 19:18:22.024888 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:18:22.024894 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:18:22.024901 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:18:22.024907 kernel: Segment Routing with IPv6 Feb 12 19:18:22.024914 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:18:22.024920 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:18:22.024928 kernel: Key type dns_resolver registered Feb 12 19:18:22.024934 kernel: registered taskstats version 1 Feb 12 19:18:22.024941 kernel: Loading compiled-in X.509 certificates Feb 12 19:18:22.024948 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:18:22.024954 kernel: Key type .fscrypt registered Feb 12 19:18:22.024961 kernel: Key type fscrypt-provisioning registered Feb 12 19:18:22.024968 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:18:22.024974 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:18:22.024981 kernel: ima: No architecture policies found Feb 12 19:18:22.024988 kernel: Freeing unused kernel memory: 34688K Feb 12 19:18:22.024995 kernel: Run /init as init process Feb 12 19:18:22.025001 kernel: with arguments: Feb 12 19:18:22.025008 kernel: /init Feb 12 19:18:22.025014 kernel: with environment: Feb 12 19:18:22.025020 kernel: HOME=/ Feb 12 19:18:22.025027 kernel: TERM=linux Feb 12 19:18:22.025033 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:18:22.025042 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:18:22.025052 systemd[1]: Detected virtualization microsoft. Feb 12 19:18:22.025059 systemd[1]: Detected architecture arm64. Feb 12 19:18:22.025066 systemd[1]: Running in initrd. Feb 12 19:18:22.025083 systemd[1]: No hostname configured, using default hostname. Feb 12 19:18:22.025090 systemd[1]: Hostname set to . Feb 12 19:18:22.025097 systemd[1]: Initializing machine ID from random generator. Feb 12 19:18:22.025104 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:18:22.025112 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:18:22.025119 systemd[1]: Reached target cryptsetup.target. Feb 12 19:18:22.025127 systemd[1]: Reached target paths.target. Feb 12 19:18:22.025133 systemd[1]: Reached target slices.target. Feb 12 19:18:22.025140 systemd[1]: Reached target swap.target. Feb 12 19:18:22.025147 systemd[1]: Reached target timers.target. Feb 12 19:18:22.025155 systemd[1]: Listening on iscsid.socket. Feb 12 19:18:22.025162 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:18:22.025170 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:18:22.025178 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:18:22.025185 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:18:22.025192 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:18:22.025199 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:18:22.025206 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:18:22.025213 systemd[1]: Reached target sockets.target. Feb 12 19:18:22.025220 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:18:22.025227 systemd[1]: Finished network-cleanup.service. Feb 12 19:18:22.025235 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:18:22.025242 systemd[1]: Starting systemd-journald.service... Feb 12 19:18:22.025249 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:18:22.025256 systemd[1]: Starting systemd-resolved.service... Feb 12 19:18:22.025263 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:18:22.025274 systemd-journald[276]: Journal started Feb 12 19:18:22.025311 systemd-journald[276]: Runtime Journal (/run/log/journal/2bcdc003b65a454fa4cb1fa41597dbcd) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:18:22.010140 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:18:22.047498 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:18:22.059091 kernel: Bridge firewalling registered Feb 12 19:18:22.059149 systemd[1]: Started systemd-journald.service. Feb 12 19:18:22.060055 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:18:22.060241 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:18:22.105411 kernel: audit: type=1130 audit(1707765502.085:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.105436 kernel: SCSI subsystem initialized Feb 12 19:18:22.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.060270 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:18:22.070868 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:18:22.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.071572 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:18:22.198988 kernel: audit: type=1130 audit(1707765502.141:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.199010 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:18:22.199020 kernel: audit: type=1130 audit(1707765502.167:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.199029 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:18:22.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.102324 systemd[1]: Started systemd-resolved.service. Feb 12 19:18:22.227406 kernel: audit: type=1130 audit(1707765502.207:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.141878 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:18:22.261033 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:18:22.261062 kernel: audit: type=1130 audit(1707765502.237:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.167365 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:18:22.207560 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:18:22.238695 systemd[1]: Reached target nss-lookup.target. Feb 12 19:18:22.260476 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:18:22.266252 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:18:22.278392 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:18:22.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.300709 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:18:22.334758 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:18:22.395800 kernel: audit: type=1130 audit(1707765502.309:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.395824 kernel: audit: type=1130 audit(1707765502.345:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.395840 kernel: audit: type=1130 audit(1707765502.372:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.345649 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:18:22.393432 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:18:22.407494 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:18:22.423025 dracut-cmdline[296]: dracut-dracut-053 Feb 12 19:18:22.429205 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:18:22.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.461901 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:18:22.488255 kernel: audit: type=1130 audit(1707765502.466:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.550094 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:18:22.559092 kernel: iscsi: registered transport (tcp) Feb 12 19:18:22.579443 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:18:22.579500 kernel: QLogic iSCSI HBA Driver Feb 12 19:18:22.614450 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:18:22.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:22.620246 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:18:22.680093 kernel: raid6: neonx8 gen() 13797 MB/s Feb 12 19:18:22.697084 kernel: raid6: neonx8 xor() 10838 MB/s Feb 12 19:18:22.719080 kernel: raid6: neonx4 gen() 13554 MB/s Feb 12 19:18:22.740080 kernel: raid6: neonx4 xor() 11092 MB/s Feb 12 19:18:22.761083 kernel: raid6: neonx2 gen() 13040 MB/s Feb 12 19:18:22.783082 kernel: raid6: neonx2 xor() 10265 MB/s Feb 12 19:18:22.804080 kernel: raid6: neonx1 gen() 10486 MB/s Feb 12 19:18:22.825094 kernel: raid6: neonx1 xor() 8806 MB/s Feb 12 19:18:22.847081 kernel: raid6: int64x8 gen() 6297 MB/s Feb 12 19:18:22.868080 kernel: raid6: int64x8 xor() 3551 MB/s Feb 12 19:18:22.888080 kernel: raid6: int64x4 gen() 7239 MB/s Feb 12 19:18:22.910081 kernel: raid6: int64x4 xor() 3851 MB/s Feb 12 19:18:22.931080 kernel: raid6: int64x2 gen() 6149 MB/s Feb 12 19:18:22.953083 kernel: raid6: int64x2 xor() 3321 MB/s Feb 12 19:18:22.975081 kernel: raid6: int64x1 gen() 5041 MB/s Feb 12 19:18:23.000420 kernel: raid6: int64x1 xor() 2644 MB/s Feb 12 19:18:23.000430 kernel: raid6: using algorithm neonx8 gen() 13797 MB/s Feb 12 19:18:23.000439 kernel: raid6: .... xor() 10838 MB/s, rmw enabled Feb 12 19:18:23.005161 kernel: raid6: using neon recovery algorithm Feb 12 19:18:23.025086 kernel: xor: measuring software checksum speed Feb 12 19:18:23.030084 kernel: 8regs : 17286 MB/sec Feb 12 19:18:23.030095 kernel: 32regs : 20749 MB/sec Feb 12 19:18:23.040236 kernel: arm64_neon : 28102 MB/sec Feb 12 19:18:23.040246 kernel: xor: using function: arm64_neon (28102 MB/sec) Feb 12 19:18:23.103090 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:18:23.113180 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:18:23.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:23.122000 audit: BPF prog-id=7 op=LOAD Feb 12 19:18:23.123000 audit: BPF prog-id=8 op=LOAD Feb 12 19:18:23.123667 systemd[1]: Starting systemd-udevd.service... Feb 12 19:18:23.138938 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 12 19:18:23.147222 systemd[1]: Started systemd-udevd.service. Feb 12 19:18:23.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:23.160014 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:18:23.177151 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:18:23.204579 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:18:23.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:23.210753 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:18:23.250018 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:18:23.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:23.305099 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:18:23.333873 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:18:23.333934 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:18:23.333943 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 12 19:18:23.344606 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:18:23.352225 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 12 19:18:23.366095 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:18:23.366145 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:18:23.375090 kernel: scsi host1: storvsc_host_t Feb 12 19:18:23.379280 kernel: scsi host0: storvsc_host_t Feb 12 19:18:23.387173 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:18:23.394843 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:18:23.428862 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:18:23.429107 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:18:23.441022 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:18:23.441230 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:18:23.441321 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:18:23.446429 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:18:23.454417 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:18:23.454570 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:18:23.461091 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:23.466085 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:18:23.482101 kernel: hv_netvsc 002248bc-8f9e-0022-48bc-8f9e002248bc eth0: VF slot 1 added Feb 12 19:18:23.497883 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:18:23.497936 kernel: hv_pci c565d6e1-296a-4e87-9633-a06d282384b3: PCI VMBus probing: Using version 0x10004 Feb 12 19:18:23.516714 kernel: hv_pci c565d6e1-296a-4e87-9633-a06d282384b3: PCI host bridge to bus 296a:00 Feb 12 19:18:23.516903 kernel: pci_bus 296a:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:18:23.525170 kernel: pci_bus 296a:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:18:23.533283 kernel: pci 296a:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:18:23.551208 kernel: pci 296a:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:18:23.573125 kernel: pci 296a:00:02.0: enabling Extended Tags Feb 12 19:18:23.596191 kernel: pci 296a:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 296a:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:18:23.611175 kernel: pci_bus 296a:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:18:23.611359 kernel: pci 296a:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:18:23.653106 kernel: mlx5_core 296a:00:02.0: firmware version: 16.30.1284 Feb 12 19:18:23.812089 kernel: mlx5_core 296a:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:18:23.874792 kernel: hv_netvsc 002248bc-8f9e-0022-48bc-8f9e002248bc eth0: VF registering: eth1 Feb 12 19:18:23.874987 kernel: mlx5_core 296a:00:02.0 eth1: joined to eth0 Feb 12 19:18:23.887097 kernel: mlx5_core 296a:00:02.0 enP10602s1: renamed from eth1 Feb 12 19:18:23.938398 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:18:23.959117 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (542) Feb 12 19:18:23.972835 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:18:24.193879 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:18:24.216475 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:18:24.223507 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:18:24.239578 systemd[1]: Starting disk-uuid.service... Feb 12 19:18:24.292094 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:24.307095 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:25.314088 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:18:25.314190 disk-uuid[604]: The operation has completed successfully. Feb 12 19:18:25.371056 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:18:25.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.371183 systemd[1]: Finished disk-uuid.service. Feb 12 19:18:25.384840 systemd[1]: Starting verity-setup.service... Feb 12 19:18:25.428092 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:18:25.659273 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:18:25.669866 systemd[1]: Finished verity-setup.service. Feb 12 19:18:25.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.675863 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:18:25.736101 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:18:25.735912 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:18:25.740025 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:18:25.740794 systemd[1]: Starting ignition-setup.service... Feb 12 19:18:25.757935 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:18:25.790946 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:25.791001 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:25.796185 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:25.848781 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:18:25.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.858000 audit: BPF prog-id=9 op=LOAD Feb 12 19:18:25.858995 systemd[1]: Starting systemd-networkd.service... Feb 12 19:18:25.885814 systemd-networkd[842]: lo: Link UP Feb 12 19:18:25.885823 systemd-networkd[842]: lo: Gained carrier Feb 12 19:18:25.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.886219 systemd-networkd[842]: Enumeration completed Feb 12 19:18:25.891355 systemd[1]: Started systemd-networkd.service. Feb 12 19:18:25.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.891690 systemd-networkd[842]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:18:25.938951 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:18:25.938951 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:18:25.938951 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:18:25.938951 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:18:25.938951 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:18:25.938951 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:18:25.938951 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:18:26.072671 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 12 19:18:26.072748 kernel: audit: type=1130 audit(1707765506.017:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:26.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.897151 systemd[1]: Reached target network.target. Feb 12 19:18:25.906526 systemd[1]: Starting iscsiuio.service... Feb 12 19:18:26.098365 kernel: mlx5_core 296a:00:02.0 enP10602s1: Link up Feb 12 19:18:25.917683 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:18:26.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.918013 systemd[1]: Started iscsiuio.service. Feb 12 19:18:26.151353 kernel: audit: type=1130 audit(1707765506.109:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:26.151381 kernel: hv_netvsc 002248bc-8f9e-0022-48bc-8f9e002248bc eth0: Data path switched to VF: enP10602s1 Feb 12 19:18:26.151509 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:25.927658 systemd[1]: Starting iscsid.service... Feb 12 19:18:25.943569 systemd[1]: Started iscsid.service. Feb 12 19:18:26.160000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:25.977645 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:18:26.007176 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:18:26.029838 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:18:26.054229 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:18:26.204157 kernel: audit: type=1130 audit(1707765506.160:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:26.067507 systemd[1]: Reached target remote-fs.target. Feb 12 19:18:26.082290 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:18:26.104125 systemd[1]: Finished ignition-setup.service. Feb 12 19:18:26.137114 systemd-networkd[842]: enP10602s1: Link UP Feb 12 19:18:26.137196 systemd-networkd[842]: eth0: Link UP Feb 12 19:18:26.137941 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:18:26.150605 systemd-networkd[842]: eth0: Gained carrier Feb 12 19:18:26.151825 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:18:26.182894 systemd-networkd[842]: enP10602s1: Gained carrier Feb 12 19:18:26.208156 systemd-networkd[842]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:18:27.595245 systemd-networkd[842]: eth0: Gained IPv6LL Feb 12 19:18:29.457512 ignition[869]: Ignition 2.14.0 Feb 12 19:18:29.457525 ignition[869]: Stage: fetch-offline Feb 12 19:18:29.457580 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:29.457603 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:29.550638 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:29.550785 ignition[869]: parsed url from cmdline: "" Feb 12 19:18:29.550788 ignition[869]: no config URL provided Feb 12 19:18:29.550794 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:18:29.616437 kernel: audit: type=1130 audit(1707765509.581:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.569391 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:18:29.550802 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:18:29.582422 systemd[1]: Starting ignition-fetch.service... Feb 12 19:18:29.550807 ignition[869]: failed to fetch config: resource requires networking Feb 12 19:18:29.551132 ignition[869]: Ignition finished successfully Feb 12 19:18:29.620989 ignition[875]: Ignition 2.14.0 Feb 12 19:18:29.620996 ignition[875]: Stage: fetch Feb 12 19:18:29.621189 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:29.621224 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:29.637611 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:29.637752 ignition[875]: parsed url from cmdline: "" Feb 12 19:18:29.637756 ignition[875]: no config URL provided Feb 12 19:18:29.637761 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:18:29.637769 ignition[875]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:18:29.637798 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:18:29.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.696307 unknown[875]: fetched base config from "system" Feb 12 19:18:29.751724 kernel: audit: type=1130 audit(1707765509.708:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.670098 ignition[875]: GET result: OK Feb 12 19:18:29.696314 unknown[875]: fetched base config from "system" Feb 12 19:18:29.670240 ignition[875]: config has been read from IMDS userdata Feb 12 19:18:29.696320 unknown[875]: fetched user config from "azure" Feb 12 19:18:29.798320 kernel: audit: type=1130 audit(1707765509.771:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.670274 ignition[875]: parsing config with SHA512: 280772a54817665e6de3d3da115e1dbd14e27cbf0996277c10ec9152db4de14a44fcccefdd04e295cf696eb361b5560d37458d414a528ce742724f128d4f7efb Feb 12 19:18:29.700066 systemd[1]: Finished ignition-fetch.service. Feb 12 19:18:29.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.696781 ignition[875]: fetch: fetch complete Feb 12 19:18:29.839058 kernel: audit: type=1130 audit(1707765509.811:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:29.741112 systemd[1]: Starting ignition-kargs.service... Feb 12 19:18:29.696785 ignition[875]: fetch: fetch passed Feb 12 19:18:29.760350 systemd[1]: Finished ignition-kargs.service. Feb 12 19:18:29.696824 ignition[875]: Ignition finished successfully Feb 12 19:18:29.772228 systemd[1]: Starting ignition-disks.service... Feb 12 19:18:29.753243 ignition[881]: Ignition 2.14.0 Feb 12 19:18:29.805837 systemd[1]: Finished ignition-disks.service. Feb 12 19:18:29.753250 ignition[881]: Stage: kargs Feb 12 19:18:29.811241 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:18:29.753366 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:29.838859 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:18:29.753387 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:29.844004 systemd[1]: Reached target local-fs.target. Feb 12 19:18:29.756044 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:29.853940 systemd[1]: Reached target sysinit.target. Feb 12 19:18:29.758001 ignition[881]: kargs: kargs passed Feb 12 19:18:29.862639 systemd[1]: Reached target basic.target. Feb 12 19:18:29.758055 ignition[881]: Ignition finished successfully Feb 12 19:18:29.876884 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:18:29.782232 ignition[887]: Ignition 2.14.0 Feb 12 19:18:29.782241 ignition[887]: Stage: disks Feb 12 19:18:29.782346 ignition[887]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:29.782363 ignition[887]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:29.785225 ignition[887]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:29.804788 ignition[887]: disks: disks passed Feb 12 19:18:29.804850 ignition[887]: Ignition finished successfully Feb 12 19:18:30.000046 systemd-fsck[895]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:18:30.015590 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:18:30.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.051936 kernel: audit: type=1130 audit(1707765510.021:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.047569 systemd[1]: Mounting sysroot.mount... Feb 12 19:18:30.074100 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:18:30.074503 systemd[1]: Mounted sysroot.mount. Feb 12 19:18:30.079651 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:18:30.121182 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:18:30.127027 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:18:30.136180 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:18:30.136222 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:18:30.148214 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:18:30.207823 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:18:30.213484 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:18:30.239107 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (906) Feb 12 19:18:30.239166 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:30.248797 initrd-setup-root[911]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:18:30.264789 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:30.264818 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:30.270358 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:18:30.281562 initrd-setup-root[937]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:18:30.291377 initrd-setup-root[945]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:18:30.301538 initrd-setup-root[953]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:18:30.771326 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:18:30.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.800988 systemd[1]: Starting ignition-mount.service... Feb 12 19:18:30.815242 kernel: audit: type=1130 audit(1707765510.776:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.813020 systemd[1]: Starting sysroot-boot.service... Feb 12 19:18:30.820832 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:18:30.820941 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:18:30.851661 ignition[973]: INFO : Ignition 2.14.0 Feb 12 19:18:30.851661 ignition[973]: INFO : Stage: mount Feb 12 19:18:30.864261 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:30.864261 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:30.864261 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:30.864261 ignition[973]: INFO : mount: mount passed Feb 12 19:18:30.864261 ignition[973]: INFO : Ignition finished successfully Feb 12 19:18:30.939679 kernel: audit: type=1130 audit(1707765510.879:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:30.873742 systemd[1]: Finished sysroot-boot.service. Feb 12 19:18:30.879646 systemd[1]: Finished ignition-mount.service. Feb 12 19:18:31.484777 coreos-metadata[905]: Feb 12 19:18:31.484 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:18:31.495296 coreos-metadata[905]: Feb 12 19:18:31.490 INFO Fetch successful Feb 12 19:18:31.523270 coreos-metadata[905]: Feb 12 19:18:31.523 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:18:31.548827 coreos-metadata[905]: Feb 12 19:18:31.548 INFO Fetch successful Feb 12 19:18:31.555942 coreos-metadata[905]: Feb 12 19:18:31.555 INFO wrote hostname ci-3510.3.2-a-96528754ae to /sysroot/etc/hostname Feb 12 19:18:31.565969 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:18:31.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.585927 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:18:31.585970 kernel: audit: type=1130 audit(1707765511.571:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:31.581486 systemd[1]: Starting ignition-files.service... Feb 12 19:18:31.608268 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:18:31.634092 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (984) Feb 12 19:18:31.646293 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:18:31.646329 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:18:31.651521 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:18:31.656054 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:18:31.672826 ignition[1003]: INFO : Ignition 2.14.0 Feb 12 19:18:31.678113 ignition[1003]: INFO : Stage: files Feb 12 19:18:31.681947 ignition[1003]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:31.681947 ignition[1003]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:31.702564 ignition[1003]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:31.702564 ignition[1003]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:18:31.702564 ignition[1003]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:18:31.702564 ignition[1003]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:18:31.781793 ignition[1003]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:18:31.789782 ignition[1003]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:18:31.789782 ignition[1003]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:18:31.789701 unknown[1003]: wrote ssh authorized keys file for user: core Feb 12 19:18:31.811600 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:18:31.811600 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 12 19:18:32.271241 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:18:32.506884 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 12 19:18:32.524689 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:18:32.524689 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:18:32.524689 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:18:32.895184 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:18:33.034899 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 12 19:18:33.051904 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:18:33.051904 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:18:33.051904 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:18:33.169927 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:18:33.453511 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 12 19:18:33.470809 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:18:33.470809 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:18:33.470809 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:18:33.517630 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:18:34.207944 ignition[1003]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:18:34.226445 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:18:34.378724 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1006) Feb 12 19:18:34.378748 kernel: audit: type=1130 audit(1707765514.321:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470864705" Feb 12 19:18:34.378804 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470864705": device or resource busy Feb 12 19:18:34.378804 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2470864705", trying btrfs: device or resource busy Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470864705" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2470864705" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2470864705" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2470864705" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2067486747" Feb 12 19:18:34.378804 ignition[1003]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2067486747": device or resource busy Feb 12 19:18:34.378804 ignition[1003]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2067486747", trying btrfs: device or resource busy Feb 12 19:18:34.378804 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2067486747" Feb 12 19:18:34.761315 kernel: audit: type=1130 audit(1707765514.427:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.761345 kernel: audit: type=1130 audit(1707765514.487:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.761356 kernel: audit: type=1131 audit(1707765514.487:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.761367 kernel: audit: type=1130 audit(1707765514.592:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.761377 kernel: audit: type=1131 audit(1707765514.592:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.761387 kernel: audit: type=1130 audit(1707765514.712:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.487000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.277254 systemd[1]: mnt-oem2470864705.mount: Deactivated successfully. Feb 12 19:18:34.768027 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2067486747" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2067486747" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2067486747" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Feb 12 19:18:34.768027 ignition[1003]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Feb 12 19:18:35.127851 kernel: audit: type=1131 audit(1707765514.842:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.127885 kernel: audit: type=1131 audit(1707765515.071:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.307496 systemd[1]: Finished ignition-files.service. Feb 12 19:18:35.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.138513 ignition[1003]: INFO : files: op(1a): [started] setting preset to enabled for "nvidia.service" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: op(1a): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:18:35.138513 ignition[1003]: INFO : files: files passed Feb 12 19:18:35.138513 ignition[1003]: INFO : Ignition finished successfully Feb 12 19:18:35.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.287517 initrd-setup-root-after-ignition[1028]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:18:35.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.324900 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:18:35.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.358626 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:18:35.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.377879 systemd[1]: Starting ignition-quench.service... Feb 12 19:18:35.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.403446 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:18:35.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.468135 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:18:35.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.468233 systemd[1]: Finished ignition-quench.service. Feb 12 19:18:34.487968 systemd[1]: Reached target ignition-complete.target. Feb 12 19:18:35.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.405619 ignition[1041]: INFO : Ignition 2.14.0 Feb 12 19:18:35.405619 ignition[1041]: INFO : Stage: umount Feb 12 19:18:35.405619 ignition[1041]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:18:35.405619 ignition[1041]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:18:35.405619 ignition[1041]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:18:35.405619 ignition[1041]: INFO : umount: umount passed Feb 12 19:18:35.405619 ignition[1041]: INFO : Ignition finished successfully Feb 12 19:18:34.555512 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:18:34.587173 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:18:35.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.587268 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:18:34.592996 systemd[1]: Reached target initrd-fs.target. Feb 12 19:18:34.639238 systemd[1]: Reached target initrd.target. Feb 12 19:18:34.651231 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:18:35.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.652105 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:18:34.707129 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:18:34.760719 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:18:34.780726 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:18:35.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.790545 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:18:35.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.807449 systemd[1]: Stopped target timers.target. Feb 12 19:18:35.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.823616 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:18:34.823698 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:18:35.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.874185 systemd[1]: Stopped target initrd.target. Feb 12 19:18:35.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.887116 systemd[1]: Stopped target basic.target. Feb 12 19:18:34.900613 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:18:35.677000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:18:34.914445 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:18:35.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.929467 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:18:35.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.951167 systemd[1]: Stopped target remote-fs.target. Feb 12 19:18:35.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.972321 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:18:35.741352 kernel: hv_netvsc 002248bc-8f9e-0022-48bc-8f9e002248bc eth0: Data path switched from VF: enP10602s1 Feb 12 19:18:35.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:34.987828 systemd[1]: Stopped target sysinit.target. Feb 12 19:18:35.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.002183 systemd[1]: Stopped target local-fs.target. Feb 12 19:18:35.021151 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:18:35.041835 systemd[1]: Stopped target swap.target. Feb 12 19:18:35.056486 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:18:35.056565 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:18:35.103634 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:18:35.118934 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:18:35.118996 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:18:35.133526 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:18:35.133566 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:18:35.146704 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:18:35.146748 systemd[1]: Stopped ignition-files.service. Feb 12 19:18:35.163157 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:18:35.163200 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:18:35.180753 systemd[1]: Stopping ignition-mount.service... Feb 12 19:18:35.199365 systemd[1]: Stopping iscsiuio.service... Feb 12 19:18:35.232208 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:18:35.232286 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:18:35.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.254820 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:18:35.260681 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:18:35.260745 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:18:35.267364 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:18:35.267419 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:18:35.280092 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:18:35.280221 systemd[1]: Stopped iscsiuio.service. Feb 12 19:18:35.292967 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:18:35.293056 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:18:35.310315 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:18:35.310408 systemd[1]: Stopped ignition-mount.service. Feb 12 19:18:35.322481 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:18:35.322532 systemd[1]: Stopped ignition-disks.service. Feb 12 19:18:35.342407 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:18:35.342455 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:18:35.356048 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:18:35.356114 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:18:35.369533 systemd[1]: Stopped target network.target. Feb 12 19:18:35.384518 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:18:35.384580 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:18:35.396259 systemd[1]: Stopped target paths.target. Feb 12 19:18:35.412871 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:18:35.423949 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:18:35.430947 systemd[1]: Stopped target slices.target. Feb 12 19:18:35.446929 systemd[1]: Stopped target sockets.target. Feb 12 19:18:35.479383 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:18:35.479419 systemd[1]: Closed iscsid.socket. Feb 12 19:18:35.489899 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:18:35.489939 systemd[1]: Closed iscsiuio.socket. Feb 12 19:18:35.502593 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:18:35.502636 systemd[1]: Stopped ignition-setup.service. Feb 12 19:18:35.513747 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:18:35.524544 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:18:35.538357 systemd-networkd[842]: eth0: DHCPv6 lease lost Feb 12 19:18:36.024000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:18:35.540167 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:18:35.540302 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:18:35.550813 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:18:35.550851 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:18:35.573802 systemd[1]: Stopping network-cleanup.service... Feb 12 19:18:35.584576 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:18:35.584651 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:18:35.598601 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:18:35.598675 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:18:35.614376 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:18:35.614428 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:18:35.620965 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:18:35.632357 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:18:35.632878 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:18:35.632977 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:18:35.644192 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:18:35.644311 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:18:36.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.657488 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:18:36.136000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:35.657541 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:18:35.667729 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:18:35.667758 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:18:35.677510 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:18:35.677566 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:18:35.687844 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:18:35.687885 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:18:35.698992 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:18:35.699037 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:18:36.203274 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 12 19:18:36.203305 iscsid[854]: iscsid shutting down. Feb 12 19:18:35.710298 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:18:35.720140 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:18:35.720201 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:18:35.734835 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:18:35.734935 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:18:35.843346 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:18:35.843471 systemd[1]: Stopped network-cleanup.service. Feb 12 19:18:36.000642 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:18:36.121764 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:18:36.121858 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:18:36.126435 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:18:36.131368 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:18:36.131424 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:18:36.137503 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:18:36.153364 systemd[1]: Switching root. Feb 12 19:18:36.203755 systemd-journald[276]: Journal stopped Feb 12 19:18:48.486394 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:18:48.486415 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:18:48.486425 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:18:48.486435 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:18:48.486443 kernel: SELinux: policy capability open_perms=1 Feb 12 19:18:48.486451 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:18:48.486459 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:18:48.486468 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:18:48.486476 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:18:48.486484 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:18:48.486493 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:18:48.486501 kernel: kauditd_printk_skb: 33 callbacks suppressed Feb 12 19:18:48.486509 kernel: audit: type=1403 audit(1707765518.407:80): auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:18:48.486521 systemd[1]: Successfully loaded SELinux policy in 297.564ms. Feb 12 19:18:48.486531 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.987ms. Feb 12 19:18:48.486543 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:18:48.486552 systemd[1]: Detected virtualization microsoft. Feb 12 19:18:48.486561 systemd[1]: Detected architecture arm64. Feb 12 19:18:48.486570 systemd[1]: Detected first boot. Feb 12 19:18:48.486579 systemd[1]: Hostname set to . Feb 12 19:18:48.486588 systemd[1]: Initializing machine ID from random generator. Feb 12 19:18:48.486597 kernel: audit: type=1400 audit(1707765519.089:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:48.486608 kernel: audit: type=1400 audit(1707765519.089:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:48.486616 kernel: audit: type=1334 audit(1707765519.112:83): prog-id=10 op=LOAD Feb 12 19:18:48.486625 kernel: audit: type=1334 audit(1707765519.112:84): prog-id=10 op=UNLOAD Feb 12 19:18:48.486633 kernel: audit: type=1334 audit(1707765519.130:85): prog-id=11 op=LOAD Feb 12 19:18:48.486642 kernel: audit: type=1334 audit(1707765519.130:86): prog-id=11 op=UNLOAD Feb 12 19:18:48.486650 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:18:48.486660 kernel: audit: type=1400 audit(1707765520.362:87): avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:18:48.486671 kernel: audit: type=1300 audit(1707765520.362:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:48.486681 kernel: audit: type=1327 audit(1707765520.362:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:18:48.486690 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:18:48.486699 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:18:48.486709 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:18:48.486720 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:18:48.486731 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 19:18:48.486739 kernel: audit: type=1334 audit(1707765527.657:89): prog-id=12 op=LOAD Feb 12 19:18:48.486748 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:18:48.486757 kernel: audit: type=1334 audit(1707765527.657:90): prog-id=3 op=UNLOAD Feb 12 19:18:48.486765 systemd[1]: Stopped iscsid.service. Feb 12 19:18:48.486776 kernel: audit: type=1334 audit(1707765527.657:91): prog-id=13 op=LOAD Feb 12 19:18:48.486785 kernel: audit: type=1334 audit(1707765527.657:92): prog-id=14 op=LOAD Feb 12 19:18:48.486795 kernel: audit: type=1334 audit(1707765527.657:93): prog-id=4 op=UNLOAD Feb 12 19:18:48.486804 kernel: audit: type=1334 audit(1707765527.657:94): prog-id=5 op=UNLOAD Feb 12 19:18:48.486813 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:18:48.486822 kernel: audit: type=1131 audit(1707765527.658:95): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.486831 kernel: audit: type=1334 audit(1707765527.684:96): prog-id=12 op=UNLOAD Feb 12 19:18:48.486840 kernel: audit: type=1131 audit(1707765527.713:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.486849 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:18:48.486859 kernel: audit: type=1130 audit(1707765527.798:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.486870 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:18:48.486879 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:18:48.486889 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:18:48.486898 systemd[1]: Created slice system-getty.slice. Feb 12 19:18:48.486907 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:18:48.486919 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:18:48.486928 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:18:48.486938 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:18:48.486947 systemd[1]: Created slice user.slice. Feb 12 19:18:48.486957 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:18:48.486967 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:18:48.486976 systemd[1]: Set up automount boot.automount. Feb 12 19:18:48.486985 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:18:48.486994 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:18:48.487003 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:18:48.487013 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:18:48.487023 systemd[1]: Reached target integritysetup.target. Feb 12 19:18:48.487033 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:18:48.487042 systemd[1]: Reached target remote-fs.target. Feb 12 19:18:48.487051 systemd[1]: Reached target slices.target. Feb 12 19:18:48.487060 systemd[1]: Reached target swap.target. Feb 12 19:18:48.487077 systemd[1]: Reached target torcx.target. Feb 12 19:18:48.487087 systemd[1]: Reached target veritysetup.target. Feb 12 19:18:48.487096 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:18:48.487107 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:18:48.487116 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:18:48.487127 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:18:48.487136 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:18:48.487145 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:18:48.487154 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:18:48.487165 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:18:48.487175 systemd[1]: Mounting media.mount... Feb 12 19:18:48.487185 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:18:48.487194 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:18:48.487203 systemd[1]: Mounting tmp.mount... Feb 12 19:18:48.487212 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:18:48.487222 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:18:48.487231 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:18:48.487241 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:18:48.487251 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:18:48.487261 systemd[1]: Starting modprobe@drm.service... Feb 12 19:18:48.487271 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:18:48.487280 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:18:48.487289 systemd[1]: Starting modprobe@loop.service... Feb 12 19:18:48.487299 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:18:48.487309 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:18:48.487318 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:18:48.487329 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:18:48.487339 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:18:48.487349 systemd[1]: Stopped systemd-journald.service. Feb 12 19:18:48.487358 kernel: loop: module loaded Feb 12 19:18:48.487366 systemd[1]: systemd-journald.service: Consumed 3.715s CPU time. Feb 12 19:18:48.487376 kernel: fuse: init (API version 7.34) Feb 12 19:18:48.487385 systemd[1]: Starting systemd-journald.service... Feb 12 19:18:48.487394 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:18:48.487403 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:18:48.487413 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:18:48.487424 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:18:48.487433 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:18:48.487443 systemd[1]: Stopped verity-setup.service. Feb 12 19:18:48.487452 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:18:48.487462 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:18:48.487471 systemd[1]: Mounted media.mount. Feb 12 19:18:48.487484 systemd-journald[1181]: Journal started Feb 12 19:18:48.487521 systemd-journald[1181]: Runtime Journal (/run/log/journal/1ff266e0a91b42bcbe32e6c4a530372a) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:18:38.407000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:18:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:39.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:18:39.112000 audit: BPF prog-id=10 op=LOAD Feb 12 19:18:39.112000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:18:39.130000 audit: BPF prog-id=11 op=LOAD Feb 12 19:18:39.130000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:18:40.362000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:18:40.362000 audit[1075]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:40.362000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:18:40.372000 audit[1075]: AVC avc: denied { associate } for pid=1075 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:18:40.372000 audit[1075]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1058 pid=1075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:40.372000 audit: CWD cwd="/" Feb 12 19:18:40.372000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:40.372000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:40.372000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:18:47.657000 audit: BPF prog-id=12 op=LOAD Feb 12 19:18:47.657000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:18:47.657000 audit: BPF prog-id=13 op=LOAD Feb 12 19:18:47.657000 audit: BPF prog-id=14 op=LOAD Feb 12 19:18:47.657000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:18:47.657000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:18:47.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.684000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:18:47.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:47.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.374000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.374000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.381000 audit: BPF prog-id=15 op=LOAD Feb 12 19:18:48.385000 audit: BPF prog-id=16 op=LOAD Feb 12 19:18:48.385000 audit: BPF prog-id=17 op=LOAD Feb 12 19:18:48.385000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:18:48.385000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:18:48.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.484000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:18:48.484000 audit[1181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=ffffe140e290 a2=4000 a3=1 items=0 ppid=1 pid=1181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:48.484000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:18:40.328991 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:18:47.655887 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:18:40.329279 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:18:47.658722 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:18:40.329298 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:18:47.659040 systemd[1]: systemd-journald.service: Consumed 3.715s CPU time. Feb 12 19:18:40.329335 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:18:40.329345 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:18:40.329373 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:18:40.329385 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:18:40.329575 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:18:40.329606 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:18:40.329617 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:18:40.343869 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:18:40.343907 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:18:40.343926 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:18:40.343940 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:18:40.343957 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:18:40.343971 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:40Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:18:46.309163 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:46.309423 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:46.309517 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:46.309670 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:18:46.309718 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:18:46.309782 /usr/lib/systemd/system-generators/torcx-generator[1075]: time="2024-02-12T19:18:46Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:18:48.504602 systemd[1]: Started systemd-journald.service. Feb 12 19:18:48.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.505394 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:18:48.510435 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:18:48.515509 systemd[1]: Mounted tmp.mount. Feb 12 19:18:48.519553 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:18:48.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.525108 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:18:48.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.531051 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:18:48.531374 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:18:48.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.537634 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:18:48.537758 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:18:48.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.544482 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:18:48.544600 systemd[1]: Finished modprobe@drm.service. Feb 12 19:18:48.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.550207 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:18:48.550337 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:18:48.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.556941 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:18:48.557113 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:18:48.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.562661 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:18:48.562779 systemd[1]: Finished modprobe@loop.service. Feb 12 19:18:48.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.568193 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:18:48.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.574723 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:18:48.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.580645 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:18:48.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.586946 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:18:48.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.593701 systemd[1]: Reached target network-pre.target. Feb 12 19:18:48.599931 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:18:48.606032 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:18:48.610861 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:18:48.625878 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:18:48.631984 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:18:48.637478 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:18:48.638671 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:18:48.643453 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:18:48.644605 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:18:48.650453 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:18:48.655901 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:18:48.662921 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:18:48.669207 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:18:48.676126 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:18:48.696324 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:18:48.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.703118 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:18:48.711977 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:18:48.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:48.742658 systemd-journald[1181]: Time spent on flushing to /var/log/journal/1ff266e0a91b42bcbe32e6c4a530372a is 14.130ms for 1110 entries. Feb 12 19:18:48.742658 systemd-journald[1181]: System Journal (/var/log/journal/1ff266e0a91b42bcbe32e6c4a530372a) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:18:48.813466 systemd-journald[1181]: Received client request to flush runtime journal. Feb 12 19:18:48.814459 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:18:48.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:49.244629 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:18:49.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:49.873746 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:18:49.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:49.880000 audit: BPF prog-id=18 op=LOAD Feb 12 19:18:49.880000 audit: BPF prog-id=19 op=LOAD Feb 12 19:18:49.880000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:18:49.880000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:18:49.881207 systemd[1]: Starting systemd-udevd.service... Feb 12 19:18:49.899576 systemd-udevd[1198]: Using default interface naming scheme 'v252'. Feb 12 19:18:50.175474 systemd[1]: Started systemd-udevd.service. Feb 12 19:18:50.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.186000 audit: BPF prog-id=20 op=LOAD Feb 12 19:18:50.187601 systemd[1]: Starting systemd-networkd.service... Feb 12 19:18:50.215538 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:18:50.230010 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:18:50.229000 audit: BPF prog-id=21 op=LOAD Feb 12 19:18:50.229000 audit: BPF prog-id=22 op=LOAD Feb 12 19:18:50.229000 audit: BPF prog-id=23 op=LOAD Feb 12 19:18:50.282098 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:18:50.302000 audit[1219]: AVC avc: denied { confidentiality } for pid=1219 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:18:50.313191 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:18:50.333058 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:18:50.333577 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:18:50.338459 systemd[1]: Started systemd-userdbd.service. Feb 12 19:18:50.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.302000 audit[1219]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafa0c2000 a1=aa2c a2=ffff9bf624b0 a3=aaaafa019010 items=12 ppid=1198 pid=1219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:50.302000 audit: CWD cwd="/" Feb 12 19:18:50.302000 audit: PATH item=0 name=(null) inode=6347 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=1 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=2 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=3 name=(null) inode=10020 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=4 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=5 name=(null) inode=10021 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=6 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=7 name=(null) inode=10022 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=8 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=9 name=(null) inode=10023 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=10 name=(null) inode=10019 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PATH item=11 name=(null) inode=10024 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:50.302000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:18:50.357587 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:18:50.357701 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:18:50.373966 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:18:50.374064 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:18:50.376145 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:18:50.482128 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:18:50.482338 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:18:50.491010 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:18:50.491145 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:18:50.491172 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:18:50.280370 systemd-networkd[1218]: lo: Link UP Feb 12 19:18:50.429823 systemd-journald[1181]: Time jumped backwards, rotating. Feb 12 19:18:50.429906 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1203) Feb 12 19:18:50.429921 kernel: mlx5_core 296a:00:02.0 enP10602s1: Link up Feb 12 19:18:50.430124 kernel: hv_netvsc 002248bc-8f9e-0022-48bc-8f9e002248bc eth0: Data path switched to VF: enP10602s1 Feb 12 19:18:50.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.281281 systemd-networkd[1218]: lo: Gained carrier Feb 12 19:18:50.281721 systemd-networkd[1218]: Enumeration completed Feb 12 19:18:50.286035 systemd[1]: Started systemd-networkd.service. Feb 12 19:18:50.293835 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:18:50.313939 systemd-networkd[1218]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:18:50.383338 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:18:50.401306 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:18:50.402701 systemd-networkd[1218]: enP10602s1: Link UP Feb 12 19:18:50.402995 systemd-networkd[1218]: eth0: Link UP Feb 12 19:18:50.402999 systemd-networkd[1218]: eth0: Gained carrier Feb 12 19:18:50.408641 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:18:50.414846 systemd-networkd[1218]: enP10602s1: Gained carrier Feb 12 19:18:50.425377 systemd-networkd[1218]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:18:50.693399 lvm[1277]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:18:50.742178 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:18:50.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.748638 systemd[1]: Reached target cryptsetup.target. Feb 12 19:18:50.755007 systemd[1]: Starting lvm2-activation.service... Feb 12 19:18:50.759012 lvm[1278]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:18:50.780156 systemd[1]: Finished lvm2-activation.service. Feb 12 19:18:50.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:50.785817 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:18:50.791254 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:18:50.791280 systemd[1]: Reached target local-fs.target. Feb 12 19:18:50.796496 systemd[1]: Reached target machines.target. Feb 12 19:18:50.802477 systemd[1]: Starting ldconfig.service... Feb 12 19:18:50.818585 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:18:50.818654 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:18:50.819890 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:18:50.826038 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:18:50.833817 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:18:50.842050 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:18:50.842134 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:18:50.843391 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:18:51.359182 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1280 (bootctl) Feb 12 19:18:51.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:51.360630 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:18:51.381361 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:18:51.457771 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:18:51.458526 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:18:51.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:51.544643 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:18:51.568878 systemd-fsck[1288]: fsck.fat 4.2 (2021-01-31) Feb 12 19:18:51.568878 systemd-fsck[1288]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:18:51.570526 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:18:51.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:51.579038 systemd[1]: Mounting boot.mount... Feb 12 19:18:51.599067 systemd[1]: Mounted boot.mount. Feb 12 19:18:51.609387 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:18:51.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:51.657859 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:18:51.848596 systemd-tmpfiles[1283]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:18:52.462418 systemd-networkd[1218]: eth0: Gained IPv6LL Feb 12 19:18:52.469167 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:18:52.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.479694 kernel: kauditd_printk_skb: 72 callbacks suppressed Feb 12 19:18:52.479789 kernel: audit: type=1130 audit(1707765532.473:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.531861 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:18:52.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.545679 systemd[1]: Starting audit-rules.service... Feb 12 19:18:52.561255 kernel: audit: type=1130 audit(1707765532.538:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.562815 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:18:52.568955 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:18:52.573000 audit: BPF prog-id=24 op=LOAD Feb 12 19:18:52.576322 systemd[1]: Starting systemd-resolved.service... Feb 12 19:18:52.584224 kernel: audit: type=1334 audit(1707765532.573:156): prog-id=24 op=LOAD Feb 12 19:18:52.584000 audit: BPF prog-id=25 op=LOAD Feb 12 19:18:52.586481 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:18:52.596202 kernel: audit: type=1334 audit(1707765532.584:157): prog-id=25 op=LOAD Feb 12 19:18:52.598011 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:18:52.671000 audit[1300]: SYSTEM_BOOT pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.683220 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:18:52.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.696156 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:18:52.698985 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:18:52.713742 kernel: audit: type=1127 audit(1707765532.671:158): pid=1300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.717346 kernel: audit: type=1130 audit(1707765532.694:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.721534 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:18:52.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.745368 systemd-resolved[1298]: Positive Trust Anchors: Feb 12 19:18:52.745375 systemd-resolved[1298]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:18:52.745402 systemd-resolved[1298]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:18:52.746282 systemd[1]: Reached target time-set.target. Feb 12 19:18:52.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.768759 kernel: audit: type=1130 audit(1707765532.720:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.768833 kernel: audit: type=1130 audit(1707765532.745:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.787697 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:18:52.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.814269 kernel: audit: type=1130 audit(1707765532.791:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.835554 systemd-resolved[1298]: Using system hostname 'ci-3510.3.2-a-96528754ae'. Feb 12 19:18:52.837106 systemd[1]: Started systemd-resolved.service. Feb 12 19:18:52.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.843136 systemd[1]: Reached target network.target. Feb 12 19:18:52.863722 systemd[1]: Reached target network-online.target. Feb 12 19:18:52.866263 kernel: audit: type=1130 audit(1707765532.841:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:18:52.870109 systemd[1]: Reached target nss-lookup.target. Feb 12 19:18:53.015000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:18:53.015000 audit[1315]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffeb0f90f0 a2=420 a3=0 items=0 ppid=1294 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.015000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:18:53.016561 augenrules[1315]: No rules Feb 12 19:18:53.017381 systemd[1]: Finished audit-rules.service. Feb 12 19:18:53.106974 systemd-timesyncd[1299]: Contacted time server 15.204.198.96:123 (0.flatcar.pool.ntp.org). Feb 12 19:18:53.107043 systemd-timesyncd[1299]: Initial clock synchronization to Mon 2024-02-12 19:18:53.122155 UTC. Feb 12 19:18:59.414308 ldconfig[1279]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:18:59.425011 systemd[1]: Finished ldconfig.service. Feb 12 19:18:59.432105 systemd[1]: Starting systemd-update-done.service... Feb 12 19:18:59.476347 systemd[1]: Finished systemd-update-done.service. Feb 12 19:18:59.485107 systemd[1]: Reached target sysinit.target. Feb 12 19:18:59.490730 systemd[1]: Started motdgen.path. Feb 12 19:18:59.497053 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:18:59.505763 systemd[1]: Started logrotate.timer. Feb 12 19:18:59.510602 systemd[1]: Started mdadm.timer. Feb 12 19:18:59.514698 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:18:59.521165 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:18:59.521195 systemd[1]: Reached target paths.target. Feb 12 19:18:59.526351 systemd[1]: Reached target timers.target. Feb 12 19:18:59.531976 systemd[1]: Listening on dbus.socket. Feb 12 19:18:59.537971 systemd[1]: Starting docker.socket... Feb 12 19:18:59.557473 systemd[1]: Listening on sshd.socket. Feb 12 19:18:59.562541 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:18:59.563058 systemd[1]: Listening on docker.socket. Feb 12 19:18:59.569007 systemd[1]: Reached target sockets.target. Feb 12 19:18:59.574225 systemd[1]: Reached target basic.target. Feb 12 19:18:59.579416 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:18:59.579442 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:18:59.580647 systemd[1]: Starting containerd.service... Feb 12 19:18:59.586346 systemd[1]: Starting dbus.service... Feb 12 19:18:59.591395 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:18:59.597991 systemd[1]: Starting extend-filesystems.service... Feb 12 19:18:59.606303 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:18:59.607474 systemd[1]: Starting motdgen.service... Feb 12 19:18:59.612787 systemd[1]: Started nvidia.service. Feb 12 19:18:59.618985 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:18:59.625369 systemd[1]: Starting prepare-critools.service... Feb 12 19:18:59.631579 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:18:59.638081 systemd[1]: Starting sshd-keygen.service... Feb 12 19:18:59.644729 systemd[1]: Starting systemd-logind.service... Feb 12 19:18:59.651154 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:18:59.651217 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:18:59.651719 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:18:59.652492 systemd[1]: Starting update-engine.service... Feb 12 19:18:59.659403 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:18:59.672197 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:18:59.672400 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:18:59.715828 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:18:59.716018 systemd[1]: Finished motdgen.service. Feb 12 19:18:59.728631 jq[1325]: false Feb 12 19:18:59.730012 jq[1343]: true Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda1 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda2 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda3 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found usr Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda4 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda6 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda7 Feb 12 19:18:59.760837 extend-filesystems[1326]: Found sda9 Feb 12 19:18:59.760837 extend-filesystems[1326]: Checking size of /dev/sda9 Feb 12 19:18:59.858429 tar[1347]: crictl Feb 12 19:18:59.859081 tar[1345]: ./ Feb 12 19:18:59.859081 tar[1345]: ./macvlan Feb 12 19:18:59.805725 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:18:59.859951 env[1349]: time="2024-02-12T19:18:59.800294517Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:18:59.805900 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:18:59.807569 systemd-logind[1336]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 12 19:18:59.808490 systemd-logind[1336]: New seat seat0. Feb 12 19:18:59.874760 jq[1367]: true Feb 12 19:18:59.884319 extend-filesystems[1326]: Old size kept for /dev/sda9 Feb 12 19:18:59.895156 extend-filesystems[1326]: Found sr0 Feb 12 19:18:59.891032 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:18:59.930491 tar[1345]: ./static Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.910843671Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.911001901Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917405571Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917445878Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917689767Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917710702Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917723190Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917732997Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.917802405Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.930569 env[1349]: time="2024-02-12T19:18:59.918012150Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:18:59.891208 systemd[1]: Finished extend-filesystems.service. Feb 12 19:18:59.932189 env[1349]: time="2024-02-12T19:18:59.918118624Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:18:59.932189 env[1349]: time="2024-02-12T19:18:59.918135275Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:18:59.932189 env[1349]: time="2024-02-12T19:18:59.918185070Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:18:59.932189 env[1349]: time="2024-02-12T19:18:59.918197238Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939288188Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939341745Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939354994Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939394262Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939409752Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939424482Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939438452Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.939809 env[1349]: time="2024-02-12T19:18:59.939809109Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.940044 env[1349]: time="2024-02-12T19:18:59.939827001Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.940044 env[1349]: time="2024-02-12T19:18:59.939840250Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.940044 env[1349]: time="2024-02-12T19:18:59.939853419Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.940044 env[1349]: time="2024-02-12T19:18:59.939868269Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:18:59.940044 env[1349]: time="2024-02-12T19:18:59.940009767Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:18:59.940135 env[1349]: time="2024-02-12T19:18:59.940087581Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940390671Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940432660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940447550Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940493662Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940507752Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940522002Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940533490Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940546138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940559548Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940571236Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940583364Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940598335Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940726663Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940741834Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.943029 env[1349]: time="2024-02-12T19:18:59.940756124Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.942104 systemd[1]: Started containerd.service. Feb 12 19:18:59.945717 env[1349]: time="2024-02-12T19:18:59.940769013Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:18:59.945717 env[1349]: time="2024-02-12T19:18:59.940784263Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:18:59.945717 env[1349]: time="2024-02-12T19:18:59.940797672Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:18:59.945717 env[1349]: time="2024-02-12T19:18:59.940815485Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:18:59.945717 env[1349]: time="2024-02-12T19:18:59.940848027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941060654Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941113451Z" level=info msg="Connect containerd service" Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941145193Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941705420Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941935500Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.941971004Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:18:59.945831 env[1349]: time="2024-02-12T19:18:59.942022320Z" level=info msg="containerd successfully booted in 0.179507s" Feb 12 19:18:59.956110 dbus-daemon[1324]: [system] SELinux support is enabled Feb 12 19:18:59.956293 systemd[1]: Started dbus.service. Feb 12 19:18:59.962810 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:18:59.962834 systemd[1]: Reached target system-config.target. Feb 12 19:18:59.973689 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:18:59.973714 systemd[1]: Reached target user-config.target. Feb 12 19:18:59.985642 systemd[1]: Started systemd-logind.service. Feb 12 19:18:59.990483 dbus-daemon[1324]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990651760Z" level=info msg="Start subscribing containerd event" Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990729934Z" level=info msg="Start recovering state" Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990821677Z" level=info msg="Start event monitor" Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990843212Z" level=info msg="Start snapshots syncer" Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990859463Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:18:59.991053 env[1349]: time="2024-02-12T19:18:59.990868830Z" level=info msg="Start streaming server" Feb 12 19:19:00.015193 tar[1345]: ./vlan Feb 12 19:19:00.027127 bash[1402]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:19:00.028156 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:19:00.085112 tar[1345]: ./portmap Feb 12 19:19:00.131881 tar[1345]: ./host-local Feb 12 19:19:00.159305 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:19:00.165713 tar[1345]: ./vrf Feb 12 19:19:00.193243 tar[1345]: ./bridge Feb 12 19:19:00.224705 tar[1345]: ./tuning Feb 12 19:19:00.265818 tar[1345]: ./firewall Feb 12 19:19:00.329230 tar[1345]: ./host-device Feb 12 19:19:00.384831 tar[1345]: ./sbr Feb 12 19:19:00.414804 tar[1345]: ./loopback Feb 12 19:19:00.456180 tar[1345]: ./dhcp Feb 12 19:19:00.473908 update_engine[1341]: I0212 19:19:00.458777 1341 main.cc:92] Flatcar Update Engine starting Feb 12 19:19:00.523081 systemd[1]: Started update-engine.service. Feb 12 19:19:00.523498 update_engine[1341]: I0212 19:19:00.523119 1341 update_check_scheduler.cc:74] Next update check in 9m35s Feb 12 19:19:00.532324 systemd[1]: Started locksmithd.service. Feb 12 19:19:00.562035 systemd[1]: Finished prepare-critools.service. Feb 12 19:19:00.597882 tar[1345]: ./ptp Feb 12 19:19:00.630371 tar[1345]: ./ipvlan Feb 12 19:19:00.661806 tar[1345]: ./bandwidth Feb 12 19:19:00.746810 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:19:01.836348 sshd_keygen[1340]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:19:01.853723 systemd[1]: Finished sshd-keygen.service. Feb 12 19:19:01.860544 systemd[1]: Starting issuegen.service... Feb 12 19:19:01.866025 systemd[1]: Started waagent.service. Feb 12 19:19:01.871284 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:19:01.871468 systemd[1]: Finished issuegen.service. Feb 12 19:19:01.877674 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:19:01.885603 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:19:01.894616 systemd[1]: Started getty@tty1.service. Feb 12 19:19:01.902857 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:19:01.908367 systemd[1]: Reached target getty.target. Feb 12 19:19:01.912927 systemd[1]: Reached target multi-user.target. Feb 12 19:19:01.919479 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:19:01.927507 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:19:01.927674 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:19:01.935519 systemd[1]: Startup finished in 734ms (kernel) + 16.292s (initrd) + 24.348s (userspace) = 41.376s. Feb 12 19:19:02.007867 locksmithd[1431]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:19:02.469995 login[1452]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:19:02.471471 login[1453]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:19:02.510344 systemd[1]: Created slice user-500.slice. Feb 12 19:19:02.511927 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:19:02.514054 systemd-logind[1336]: New session 1 of user core. Feb 12 19:19:02.553182 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:19:02.554764 systemd[1]: Starting user@500.service... Feb 12 19:19:02.577775 (systemd)[1456]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:02.771028 systemd[1456]: Queued start job for default target default.target. Feb 12 19:19:02.771547 systemd[1456]: Reached target paths.target. Feb 12 19:19:02.771566 systemd[1456]: Reached target sockets.target. Feb 12 19:19:02.771577 systemd[1456]: Reached target timers.target. Feb 12 19:19:02.771588 systemd[1456]: Reached target basic.target. Feb 12 19:19:02.771631 systemd[1456]: Reached target default.target. Feb 12 19:19:02.771654 systemd[1456]: Startup finished in 188ms. Feb 12 19:19:02.771703 systemd[1]: Started user@500.service. Feb 12 19:19:02.772647 systemd[1]: Started session-1.scope. Feb 12 19:19:03.470343 login[1452]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:19:03.473901 systemd-logind[1336]: New session 2 of user core. Feb 12 19:19:03.474714 systemd[1]: Started session-2.scope. Feb 12 19:19:08.653400 waagent[1450]: 2024-02-12T19:19:08.653285Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:19:08.662639 waagent[1450]: 2024-02-12T19:19:08.661789Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:19:08.669528 waagent[1450]: 2024-02-12T19:19:08.668971Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:19:08.678172 waagent[1450]: 2024-02-12T19:19:08.678063Z INFO Daemon Daemon Run daemon Feb 12 19:19:08.684251 waagent[1450]: 2024-02-12T19:19:08.682941Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:19:08.702184 waagent[1450]: 2024-02-12T19:19:08.702036Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:19:08.717705 waagent[1450]: 2024-02-12T19:19:08.717559Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:19:08.728401 waagent[1450]: 2024-02-12T19:19:08.728310Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:19:08.734341 waagent[1450]: 2024-02-12T19:19:08.734264Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:19:08.741168 waagent[1450]: 2024-02-12T19:19:08.741097Z INFO Daemon Daemon Activate resource disk Feb 12 19:19:08.746717 waagent[1450]: 2024-02-12T19:19:08.746642Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:19:08.762577 waagent[1450]: 2024-02-12T19:19:08.762494Z INFO Daemon Daemon Found device: None Feb 12 19:19:08.768329 waagent[1450]: 2024-02-12T19:19:08.768255Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:19:08.778228 waagent[1450]: 2024-02-12T19:19:08.778153Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:19:08.791822 waagent[1450]: 2024-02-12T19:19:08.791754Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:19:08.798401 waagent[1450]: 2024-02-12T19:19:08.798339Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:19:08.811695 waagent[1450]: 2024-02-12T19:19:08.811545Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:19:08.828810 waagent[1450]: 2024-02-12T19:19:08.828662Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:19:08.839600 waagent[1450]: 2024-02-12T19:19:08.839515Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:19:08.844803 waagent[1450]: 2024-02-12T19:19:08.844727Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:19:08.921155 waagent[1450]: 2024-02-12T19:19:08.920955Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:19:09.060911 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:19:09.084621 waagent[1450]: 2024-02-12T19:19:09.084451Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:19:09.090768 waagent[1450]: 2024-02-12T19:19:09.090676Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:19:09.097798 waagent[1450]: 2024-02-12T19:19:09.097710Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:19:09.106324 waagent[1450]: 2024-02-12T19:19:09.106232Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:19:09.112959 waagent[1450]: 2024-02-12T19:19:09.112880Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:19:09.119331 waagent[1450]: 2024-02-12T19:19:09.119256Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:19:09.259391 waagent[1450]: 2024-02-12T19:19:09.259272Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:19:09.267427 waagent[1450]: 2024-02-12T19:19:09.267381Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:19:09.273083 waagent[1450]: 2024-02-12T19:19:09.273017Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:19:10.116081 waagent[1450]: 2024-02-12T19:19:10.115915Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:19:10.131718 waagent[1450]: 2024-02-12T19:19:10.131630Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:19:10.137575 waagent[1450]: 2024-02-12T19:19:10.137498Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:19:10.216277 waagent[1450]: 2024-02-12T19:19:10.216108Z INFO Daemon Daemon Found private key matching thumbprint 013833255CEAD4F6F95DC2953C79D76C16C3F3EF Feb 12 19:19:10.225059 waagent[1450]: 2024-02-12T19:19:10.224973Z INFO Daemon Daemon Certificate with thumbprint 3AF33E81E405A6289615F2CD6234C8568DBC52FD has no matching private key. Feb 12 19:19:10.234810 waagent[1450]: 2024-02-12T19:19:10.234736Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:19:11.469442 waagent[1450]: 2024-02-12T19:19:11.469373Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 033d54a2-3a7a-4e80-9a75-92f30ba058d0 New eTag: 8768549133743373663] Feb 12 19:19:11.483302 waagent[1450]: 2024-02-12T19:19:11.483194Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:19:11.502028 waagent[1450]: 2024-02-12T19:19:11.501962Z INFO Daemon Daemon Starting provisioning Feb 12 19:19:11.507770 waagent[1450]: 2024-02-12T19:19:11.507687Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:19:11.513532 waagent[1450]: 2024-02-12T19:19:11.513455Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-96528754ae] Feb 12 19:19:11.580172 waagent[1450]: 2024-02-12T19:19:11.580022Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-96528754ae] Feb 12 19:19:11.588255 waagent[1450]: 2024-02-12T19:19:11.588156Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:19:11.596067 waagent[1450]: 2024-02-12T19:19:11.595988Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:19:11.613825 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:19:11.614000 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:19:11.614057 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:19:11.614336 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:19:11.620302 systemd-networkd[1218]: eth0: DHCPv6 lease lost Feb 12 19:19:11.621624 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:19:11.621803 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:19:11.623857 systemd[1]: Starting systemd-networkd.service... Feb 12 19:19:11.651184 systemd-networkd[1502]: enP10602s1: Link UP Feb 12 19:19:11.651508 systemd-networkd[1502]: enP10602s1: Gained carrier Feb 12 19:19:11.652484 systemd-networkd[1502]: eth0: Link UP Feb 12 19:19:11.652575 systemd-networkd[1502]: eth0: Gained carrier Feb 12 19:19:11.652951 systemd-networkd[1502]: lo: Link UP Feb 12 19:19:11.653015 systemd-networkd[1502]: lo: Gained carrier Feb 12 19:19:11.653516 systemd-networkd[1502]: eth0: Gained IPv6LL Feb 12 19:19:11.653820 systemd-networkd[1502]: Enumeration completed Feb 12 19:19:11.653992 systemd[1]: Started systemd-networkd.service. Feb 12 19:19:11.654637 systemd-networkd[1502]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:19:11.655987 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:19:11.660172 waagent[1450]: 2024-02-12T19:19:11.659962Z INFO Daemon Daemon Create user account if not exists Feb 12 19:19:11.667633 waagent[1450]: 2024-02-12T19:19:11.667532Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:19:11.674888 waagent[1450]: 2024-02-12T19:19:11.674799Z INFO Daemon Daemon Configure sudoer Feb 12 19:19:11.680784 waagent[1450]: 2024-02-12T19:19:11.680705Z INFO Daemon Daemon Configure sshd Feb 12 19:19:11.685919 waagent[1450]: 2024-02-12T19:19:11.685842Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:19:11.697290 systemd-networkd[1502]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:19:11.699896 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:19:12.947482 waagent[1450]: 2024-02-12T19:19:12.947392Z INFO Daemon Daemon Provisioning complete Feb 12 19:19:12.970862 waagent[1450]: 2024-02-12T19:19:12.970795Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:19:12.978792 waagent[1450]: 2024-02-12T19:19:12.978707Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:19:12.991876 waagent[1450]: 2024-02-12T19:19:12.991791Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:19:13.293077 waagent[1511]: 2024-02-12T19:19:13.292930Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:19:13.294156 waagent[1511]: 2024-02-12T19:19:13.294099Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:13.294415 waagent[1511]: 2024-02-12T19:19:13.294365Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:13.309647 waagent[1511]: 2024-02-12T19:19:13.309552Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:19:13.309988 waagent[1511]: 2024-02-12T19:19:13.309938Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:19:13.384844 waagent[1511]: 2024-02-12T19:19:13.384694Z INFO ExtHandler ExtHandler Found private key matching thumbprint 013833255CEAD4F6F95DC2953C79D76C16C3F3EF Feb 12 19:19:13.385240 waagent[1511]: 2024-02-12T19:19:13.385186Z INFO ExtHandler ExtHandler Certificate with thumbprint 3AF33E81E405A6289615F2CD6234C8568DBC52FD has no matching private key. Feb 12 19:19:13.385637 waagent[1511]: 2024-02-12T19:19:13.385585Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:19:13.401626 waagent[1511]: 2024-02-12T19:19:13.401565Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 2eed9ded-af52-4b80-8e63-9c50faa4d86d New eTag: 8768549133743373663] Feb 12 19:19:13.402501 waagent[1511]: 2024-02-12T19:19:13.402438Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:19:13.496572 waagent[1511]: 2024-02-12T19:19:13.496427Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:19:13.522035 waagent[1511]: 2024-02-12T19:19:13.521946Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1511 Feb 12 19:19:13.525959 waagent[1511]: 2024-02-12T19:19:13.525889Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:19:13.527435 waagent[1511]: 2024-02-12T19:19:13.527377Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:19:13.650513 waagent[1511]: 2024-02-12T19:19:13.650397Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:19:13.651060 waagent[1511]: 2024-02-12T19:19:13.651005Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:19:13.658656 waagent[1511]: 2024-02-12T19:19:13.658602Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:19:13.659314 waagent[1511]: 2024-02-12T19:19:13.659232Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:19:13.660639 waagent[1511]: 2024-02-12T19:19:13.660575Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:19:13.662148 waagent[1511]: 2024-02-12T19:19:13.662077Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:19:13.662448 waagent[1511]: 2024-02-12T19:19:13.662374Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:13.662995 waagent[1511]: 2024-02-12T19:19:13.662924Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:13.663636 waagent[1511]: 2024-02-12T19:19:13.663566Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:19:13.663967 waagent[1511]: 2024-02-12T19:19:13.663904Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:19:13.663967 waagent[1511]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:19:13.663967 waagent[1511]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:19:13.663967 waagent[1511]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:19:13.663967 waagent[1511]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:13.663967 waagent[1511]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:13.663967 waagent[1511]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:13.666364 waagent[1511]: 2024-02-12T19:19:13.666169Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:19:13.666714 waagent[1511]: 2024-02-12T19:19:13.666640Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:13.667608 waagent[1511]: 2024-02-12T19:19:13.667528Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:13.668233 waagent[1511]: 2024-02-12T19:19:13.668160Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:19:13.668416 waagent[1511]: 2024-02-12T19:19:13.668364Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:19:13.668536 waagent[1511]: 2024-02-12T19:19:13.668493Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:19:13.669397 waagent[1511]: 2024-02-12T19:19:13.669338Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:19:13.669547 waagent[1511]: 2024-02-12T19:19:13.669478Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:19:13.670323 waagent[1511]: 2024-02-12T19:19:13.670211Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:19:13.670509 waagent[1511]: 2024-02-12T19:19:13.670439Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:19:13.670799 waagent[1511]: 2024-02-12T19:19:13.670733Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:19:13.707212 waagent[1511]: 2024-02-12T19:19:13.707080Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1502' Feb 12 19:19:13.810780 waagent[1511]: 2024-02-12T19:19:13.810632Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:19:13.810780 waagent[1511]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:19:13.810780 waagent[1511]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:19:13.810780 waagent[1511]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8f:9e brd ff:ff:ff:ff:ff:ff Feb 12 19:19:13.810780 waagent[1511]: 3: enP10602s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8f:9e brd ff:ff:ff:ff:ff:ff\ altname enP10602p0s2 Feb 12 19:19:13.810780 waagent[1511]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:19:13.810780 waagent[1511]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:19:13.810780 waagent[1511]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:19:13.810780 waagent[1511]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:19:13.810780 waagent[1511]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:19:13.810780 waagent[1511]: 2: eth0 inet6 fe80::222:48ff:febc:8f9e/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:19:13.835190 waagent[1511]: 2024-02-12T19:19:13.835123Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:19:13.836112 waagent[1511]: 2024-02-12T19:19:13.836050Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:19:13.837614 waagent[1511]: 2024-02-12T19:19:13.837552Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:19:14.091611 waagent[1511]: 2024-02-12T19:19:14.091471Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Feb 12 19:19:14.094808 waagent[1511]: 2024-02-12T19:19:14.094690Z INFO EnvHandler ExtHandler Firewall rules: Feb 12 19:19:14.094808 waagent[1511]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:14.094808 waagent[1511]: pkts bytes target prot opt in out source destination Feb 12 19:19:14.094808 waagent[1511]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:14.094808 waagent[1511]: pkts bytes target prot opt in out source destination Feb 12 19:19:14.094808 waagent[1511]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:14.094808 waagent[1511]: pkts bytes target prot opt in out source destination Feb 12 19:19:14.094808 waagent[1511]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:19:14.094808 waagent[1511]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:19:14.096519 waagent[1511]: 2024-02-12T19:19:14.096469Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:19:15.059818 waagent[1511]: 2024-02-12T19:19:15.059756Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:19:20.982175 waagent[1511]: 2024-02-12T19:19:20.982112Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:19:22.002316 waagent[1450]: 2024-02-12T19:19:22.002180Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:19:22.006093 waagent[1450]: 2024-02-12T19:19:22.006036Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:19:23.173280 waagent[1551]: 2024-02-12T19:19:23.173170Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:19:23.174307 waagent[1551]: 2024-02-12T19:19:23.174230Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:19:23.174557 waagent[1551]: 2024-02-12T19:19:23.174499Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:19:23.182468 waagent[1551]: 2024-02-12T19:19:23.182348Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:19:23.183009 waagent[1551]: 2024-02-12T19:19:23.182956Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:23.183258 waagent[1551]: 2024-02-12T19:19:23.183196Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:23.196538 waagent[1551]: 2024-02-12T19:19:23.196450Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:19:23.339277 waagent[1551]: 2024-02-12T19:19:23.339185Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:19:23.340602 waagent[1551]: 2024-02-12T19:19:23.340541Z INFO ExtHandler Feb 12 19:19:23.340865 waagent[1551]: 2024-02-12T19:19:23.340816Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 1df2e9fa-e141-46ff-b51b-b471318af117 eTag: 8768549133743373663 source: Fabric] Feb 12 19:19:23.341715 waagent[1551]: 2024-02-12T19:19:23.341658Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:19:23.343051 waagent[1551]: 2024-02-12T19:19:23.342991Z INFO ExtHandler Feb 12 19:19:23.343308 waagent[1551]: 2024-02-12T19:19:23.343231Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:19:23.350375 waagent[1551]: 2024-02-12T19:19:23.350313Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:19:23.351106 waagent[1551]: 2024-02-12T19:19:23.351060Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:19:24.133917 waagent[1551]: 2024-02-12T19:19:24.133853Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:19:24.207190 waagent[1551]: 2024-02-12T19:19:24.207053Z INFO ExtHandler Downloaded certificate {'thumbprint': '3AF33E81E405A6289615F2CD6234C8568DBC52FD', 'hasPrivateKey': False} Feb 12 19:19:24.208684 waagent[1551]: 2024-02-12T19:19:24.208625Z INFO ExtHandler Downloaded certificate {'thumbprint': '013833255CEAD4F6F95DC2953C79D76C16C3F3EF', 'hasPrivateKey': True} Feb 12 19:19:24.209853 waagent[1551]: 2024-02-12T19:19:24.209795Z INFO ExtHandler Fetch goal state completed Feb 12 19:19:24.237677 waagent[1551]: 2024-02-12T19:19:24.237597Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1551 Feb 12 19:19:24.241341 waagent[1551]: 2024-02-12T19:19:24.241278Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:19:24.242925 waagent[1551]: 2024-02-12T19:19:24.242864Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:19:24.247824 waagent[1551]: 2024-02-12T19:19:24.247776Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:19:24.248342 waagent[1551]: 2024-02-12T19:19:24.248283Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:19:24.256511 waagent[1551]: 2024-02-12T19:19:24.256455Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:19:24.257203 waagent[1551]: 2024-02-12T19:19:24.257145Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:19:24.328659 waagent[1551]: 2024-02-12T19:19:24.328530Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Feb 12 19:19:24.331648 waagent[1551]: 2024-02-12T19:19:24.331537Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Feb 12 19:19:24.335506 waagent[1551]: 2024-02-12T19:19:24.335445Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:19:24.337277 waagent[1551]: 2024-02-12T19:19:24.337194Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:19:24.337552 waagent[1551]: 2024-02-12T19:19:24.337481Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:24.338108 waagent[1551]: 2024-02-12T19:19:24.338038Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:24.338720 waagent[1551]: 2024-02-12T19:19:24.338649Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:19:24.339046 waagent[1551]: 2024-02-12T19:19:24.338980Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:19:24.339046 waagent[1551]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:19:24.339046 waagent[1551]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:19:24.339046 waagent[1551]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:19:24.339046 waagent[1551]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:24.339046 waagent[1551]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:24.339046 waagent[1551]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:19:24.341280 waagent[1551]: 2024-02-12T19:19:24.341150Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:19:24.341745 waagent[1551]: 2024-02-12T19:19:24.341671Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:19:24.344388 waagent[1551]: 2024-02-12T19:19:24.344324Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:19:24.344484 waagent[1551]: 2024-02-12T19:19:24.344020Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:19:24.344729 waagent[1551]: 2024-02-12T19:19:24.344666Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:19:24.346188 waagent[1551]: 2024-02-12T19:19:24.346122Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:19:24.348328 waagent[1551]: 2024-02-12T19:19:24.348140Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:19:24.348551 waagent[1551]: 2024-02-12T19:19:24.348478Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:19:24.348731 waagent[1551]: 2024-02-12T19:19:24.348678Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:19:24.349542 waagent[1551]: 2024-02-12T19:19:24.349458Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:19:24.350012 waagent[1551]: 2024-02-12T19:19:24.349942Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:19:24.350201 waagent[1551]: 2024-02-12T19:19:24.350133Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:19:24.350201 waagent[1551]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:19:24.350201 waagent[1551]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:19:24.350201 waagent[1551]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8f:9e brd ff:ff:ff:ff:ff:ff Feb 12 19:19:24.350201 waagent[1551]: 3: enP10602s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:bc:8f:9e brd ff:ff:ff:ff:ff:ff\ altname enP10602p0s2 Feb 12 19:19:24.350201 waagent[1551]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:19:24.350201 waagent[1551]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:19:24.350201 waagent[1551]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:19:24.350201 waagent[1551]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:19:24.350201 waagent[1551]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:19:24.350201 waagent[1551]: 2: eth0 inet6 fe80::222:48ff:febc:8f9e/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:19:24.367082 waagent[1551]: 2024-02-12T19:19:24.366999Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:19:24.368722 waagent[1551]: 2024-02-12T19:19:24.368649Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:19:24.450560 waagent[1551]: 2024-02-12T19:19:24.450485Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:19:24.450560 waagent[1551]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:24.450560 waagent[1551]: pkts bytes target prot opt in out source destination Feb 12 19:19:24.450560 waagent[1551]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:24.450560 waagent[1551]: pkts bytes target prot opt in out source destination Feb 12 19:19:24.450560 waagent[1551]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:19:24.450560 waagent[1551]: pkts bytes target prot opt in out source destination Feb 12 19:19:24.450560 waagent[1551]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:19:24.450560 waagent[1551]: 128 27996 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:19:24.450560 waagent[1551]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:19:24.535200 waagent[1551]: 2024-02-12T19:19:24.535144Z INFO ExtHandler ExtHandler Feb 12 19:19:24.535537 waagent[1551]: 2024-02-12T19:19:24.535483Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 09bed4c9-1b81-410a-90fa-8507506b545b correlation dc1b48d6-ad20-44e1-8563-58eb43a89a1e created: 2024-02-12T19:17:29.258408Z] Feb 12 19:19:24.536537 waagent[1551]: 2024-02-12T19:19:24.536481Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:19:24.538441 waagent[1551]: 2024-02-12T19:19:24.538388Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 12 19:19:24.559238 waagent[1551]: 2024-02-12T19:19:24.559169Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:19:24.569374 waagent[1551]: 2024-02-12T19:19:24.569283Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 8242ED68-F5C6-406D-BC16-CB1FD52625C6;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:19:36.970974 systemd[1]: Created slice system-sshd.slice. Feb 12 19:19:36.972061 systemd[1]: Started sshd@0-10.200.20.12:22-10.200.12.6:42350.service. Feb 12 19:19:37.613011 sshd[1590]: Accepted publickey for core from 10.200.12.6 port 42350 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:37.638184 sshd[1590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:37.641973 systemd-logind[1336]: New session 3 of user core. Feb 12 19:19:37.642858 systemd[1]: Started session-3.scope. Feb 12 19:19:37.979513 systemd[1]: Started sshd@1-10.200.20.12:22-10.200.12.6:46574.service. Feb 12 19:19:38.135680 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:19:38.395004 sshd[1595]: Accepted publickey for core from 10.200.12.6 port 46574 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:38.396449 sshd[1595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:38.400101 systemd-logind[1336]: New session 4 of user core. Feb 12 19:19:38.400569 systemd[1]: Started session-4.scope. Feb 12 19:19:38.697613 sshd[1595]: pam_unix(sshd:session): session closed for user core Feb 12 19:19:38.699920 systemd[1]: sshd@1-10.200.20.12:22-10.200.12.6:46574.service: Deactivated successfully. Feb 12 19:19:38.700625 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:19:38.701146 systemd-logind[1336]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:19:38.701937 systemd-logind[1336]: Removed session 4. Feb 12 19:19:38.767297 systemd[1]: Started sshd@2-10.200.20.12:22-10.200.12.6:46578.service. Feb 12 19:19:39.183214 sshd[1601]: Accepted publickey for core from 10.200.12.6 port 46578 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:39.184886 sshd[1601]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:39.188976 systemd[1]: Started session-5.scope. Feb 12 19:19:39.189619 systemd-logind[1336]: New session 5 of user core. Feb 12 19:19:39.483008 sshd[1601]: pam_unix(sshd:session): session closed for user core Feb 12 19:19:39.485484 systemd[1]: sshd@2-10.200.20.12:22-10.200.12.6:46578.service: Deactivated successfully. Feb 12 19:19:39.486143 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:19:39.486652 systemd-logind[1336]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:19:39.487460 systemd-logind[1336]: Removed session 5. Feb 12 19:19:39.557661 systemd[1]: Started sshd@3-10.200.20.12:22-10.200.12.6:46584.service. Feb 12 19:19:40.004613 sshd[1607]: Accepted publickey for core from 10.200.12.6 port 46584 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:40.005833 sshd[1607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:40.009979 systemd[1]: Started session-6.scope. Feb 12 19:19:40.010296 systemd-logind[1336]: New session 6 of user core. Feb 12 19:19:40.328295 sshd[1607]: pam_unix(sshd:session): session closed for user core Feb 12 19:19:40.330832 systemd[1]: sshd@3-10.200.20.12:22-10.200.12.6:46584.service: Deactivated successfully. Feb 12 19:19:40.331497 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:19:40.332024 systemd-logind[1336]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:19:40.332841 systemd-logind[1336]: Removed session 6. Feb 12 19:19:40.397903 systemd[1]: Started sshd@4-10.200.20.12:22-10.200.12.6:46588.service. Feb 12 19:19:40.814562 sshd[1613]: Accepted publickey for core from 10.200.12.6 port 46588 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:40.815861 sshd[1613]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:40.819737 systemd-logind[1336]: New session 7 of user core. Feb 12 19:19:40.820141 systemd[1]: Started session-7.scope. Feb 12 19:19:41.407989 sudo[1616]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:19:41.408201 sudo[1616]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:19:41.483487 dbus-daemon[1324]: avc: received setenforce notice (enforcing=1) Feb 12 19:19:41.485266 sudo[1616]: pam_unix(sudo:session): session closed for user root Feb 12 19:19:41.568491 sshd[1613]: pam_unix(sshd:session): session closed for user core Feb 12 19:19:41.571398 systemd-logind[1336]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:19:41.571949 systemd[1]: sshd@4-10.200.20.12:22-10.200.12.6:46588.service: Deactivated successfully. Feb 12 19:19:41.572646 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:19:41.573337 systemd-logind[1336]: Removed session 7. Feb 12 19:19:41.637207 systemd[1]: Started sshd@5-10.200.20.12:22-10.200.12.6:46594.service. Feb 12 19:19:42.054437 sshd[1620]: Accepted publickey for core from 10.200.12.6 port 46594 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:42.056658 sshd[1620]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:42.060909 systemd[1]: Started session-8.scope. Feb 12 19:19:42.061215 systemd-logind[1336]: New session 8 of user core. Feb 12 19:19:42.292647 sudo[1624]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:19:42.292850 sudo[1624]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:19:42.295351 sudo[1624]: pam_unix(sudo:session): session closed for user root Feb 12 19:19:42.299598 sudo[1623]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:19:42.300039 sudo[1623]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:19:42.308349 systemd[1]: Stopping audit-rules.service... Feb 12 19:19:42.309000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:19:42.313726 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:19:42.313820 kernel: audit: type=1305 audit(1707765582.309:165): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:19:42.314062 auditctl[1627]: No rules Feb 12 19:19:42.314534 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:19:42.314699 systemd[1]: Stopped audit-rules.service. Feb 12 19:19:42.309000 audit[1627]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc68b0250 a2=420 a3=0 items=0 ppid=1 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:42.325566 systemd[1]: Starting audit-rules.service... Feb 12 19:19:42.347090 kernel: audit: type=1300 audit(1707765582.309:165): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc68b0250 a2=420 a3=0 items=0 ppid=1 pid=1627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:42.309000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:19:42.356653 kernel: audit: type=1327 audit(1707765582.309:165): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:19:42.313000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.374100 kernel: audit: type=1131 audit(1707765582.313:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.381087 augenrules[1644]: No rules Feb 12 19:19:42.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.382815 sudo[1623]: pam_unix(sudo:session): session closed for user root Feb 12 19:19:42.381666 systemd[1]: Finished audit-rules.service. Feb 12 19:19:42.381000 audit[1623]: USER_END pid=1623 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.417117 kernel: audit: type=1130 audit(1707765582.381:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.417184 kernel: audit: type=1106 audit(1707765582.381:168): pid=1623 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.417212 kernel: audit: type=1104 audit(1707765582.381:169): pid=1623 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.381000 audit[1623]: CRED_DISP pid=1623 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.449783 sshd[1620]: pam_unix(sshd:session): session closed for user core Feb 12 19:19:42.450000 audit[1620]: USER_END pid=1620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.451983 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:19:42.452576 systemd[1]: sshd@5-10.200.20.12:22-10.200.12.6:46594.service: Deactivated successfully. Feb 12 19:19:42.453973 systemd-logind[1336]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:19:42.454655 systemd-logind[1336]: Removed session 8. Feb 12 19:19:42.450000 audit[1620]: CRED_DISP pid=1620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.498295 kernel: audit: type=1106 audit(1707765582.450:170): pid=1620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.498369 kernel: audit: type=1104 audit(1707765582.450:171): pid=1620 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:46594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.518161 kernel: audit: type=1131 audit(1707765582.450:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:46594 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.523109 systemd[1]: Started sshd@6-10.200.20.12:22-10.200.12.6:46602.service. Feb 12 19:19:42.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:46602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:42.970000 audit[1650]: USER_ACCT pid=1650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.971099 sshd[1650]: Accepted publickey for core from 10.200.12.6 port 46602 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:19:42.972000 audit[1650]: CRED_ACQ pid=1650 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.972000 audit[1650]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd547ac30 a2=3 a3=1 items=0 ppid=1 pid=1650 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:42.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:19:42.972607 sshd[1650]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:19:42.976182 systemd-logind[1336]: New session 9 of user core. Feb 12 19:19:42.976673 systemd[1]: Started session-9.scope. Feb 12 19:19:42.980000 audit[1650]: USER_START pid=1650 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:42.981000 audit[1652]: CRED_ACQ pid=1652 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:19:43.224000 audit[1653]: USER_ACCT pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:43.224000 audit[1653]: CRED_REFR pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:43.224624 sudo[1653]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:19:43.225124 sudo[1653]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:19:43.226000 audit[1653]: USER_START pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:19:43.877037 systemd[1]: Reloading. Feb 12 19:19:43.953285 /usr/lib/systemd/system-generators/torcx-generator[1685]: time="2024-02-12T19:19:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:19:43.953631 /usr/lib/systemd/system-generators/torcx-generator[1685]: time="2024-02-12T19:19:43Z" level=info msg="torcx already run" Feb 12 19:19:44.016562 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:19:44.016581 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:19:44.031967 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit: BPF prog-id=32 op=LOAD Feb 12 19:19:44.099000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.099000 audit: BPF prog-id=33 op=LOAD Feb 12 19:19:44.099000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit: BPF prog-id=34 op=LOAD Feb 12 19:19:44.101000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit: BPF prog-id=35 op=LOAD Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.101000 audit: BPF prog-id=36 op=LOAD Feb 12 19:19:44.102000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:19:44.102000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.102000 audit: BPF prog-id=37 op=LOAD Feb 12 19:19:44.102000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit: BPF prog-id=38 op=LOAD Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.103000 audit: BPF prog-id=39 op=LOAD Feb 12 19:19:44.103000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:19:44.103000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit: BPF prog-id=40 op=LOAD Feb 12 19:19:44.104000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit: BPF prog-id=41 op=LOAD Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit: BPF prog-id=42 op=LOAD Feb 12 19:19:44.104000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:19:44.104000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.104000 audit: BPF prog-id=43 op=LOAD Feb 12 19:19:44.104000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit: BPF prog-id=44 op=LOAD Feb 12 19:19:44.106000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit: BPF prog-id=45 op=LOAD Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:44.106000 audit: BPF prog-id=46 op=LOAD Feb 12 19:19:44.106000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:19:44.106000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:19:44.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:44.112708 systemd[1]: Started kubelet.service. Feb 12 19:19:44.124598 systemd[1]: Starting coreos-metadata.service... Feb 12 19:19:44.164791 coreos-metadata[1748]: Feb 12 19:19:44.162 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:19:44.170316 coreos-metadata[1748]: Feb 12 19:19:44.170 INFO Fetch successful Feb 12 19:19:44.170316 coreos-metadata[1748]: Feb 12 19:19:44.170 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 12 19:19:44.172593 coreos-metadata[1748]: Feb 12 19:19:44.172 INFO Fetch successful Feb 12 19:19:44.172593 coreos-metadata[1748]: Feb 12 19:19:44.172 INFO Fetching http://168.63.129.16/machine/35b5c70b-b466-4205-9dfb-7cc898b00952/0fa86f58%2Ddf34%2D4bf3%2D9d56%2D3426f109bdf1.%5Fci%2D3510.3.2%2Da%2D96528754ae?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 12 19:19:44.176271 coreos-metadata[1748]: Feb 12 19:19:44.174 INFO Fetch successful Feb 12 19:19:44.180066 kubelet[1741]: E0212 19:19:44.180004 1741 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:19:44.182200 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:19:44.182348 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:19:44.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:19:44.209405 coreos-metadata[1748]: Feb 12 19:19:44.209 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:19:44.233372 coreos-metadata[1748]: Feb 12 19:19:44.233 INFO Fetch successful Feb 12 19:19:44.242793 systemd[1]: Finished coreos-metadata.service. Feb 12 19:19:44.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:45.561404 update_engine[1341]: I0212 19:19:45.561340 1341 update_attempter.cc:509] Updating boot flags... Feb 12 19:19:47.593701 systemd[1]: Stopped kubelet.service. Feb 12 19:19:47.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:47.598204 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 12 19:19:47.598289 kernel: audit: type=1130 audit(1707765587.593:357): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:47.615273 kernel: audit: type=1131 audit(1707765587.593:358): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:47.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:47.636932 systemd[1]: Reloading. Feb 12 19:19:47.700784 /usr/lib/systemd/system-generators/torcx-generator[1845]: time="2024-02-12T19:19:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:19:47.701501 /usr/lib/systemd/system-generators/torcx-generator[1845]: time="2024-02-12T19:19:47Z" level=info msg="torcx already run" Feb 12 19:19:47.795770 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:19:47.795917 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:19:47.811631 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:19:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.916595 kernel: audit: type=1400 audit(1707765587.884:359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.916696 kernel: audit: type=1400 audit(1707765587.884:360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.916725 kernel: audit: type=1400 audit(1707765587.885:361): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949759 kernel: audit: type=1400 audit(1707765587.885:362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.967017 kernel: audit: type=1400 audit(1707765587.885:363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.984033 kernel: audit: type=1400 audit(1707765587.885:364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.984120 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007033 kernel: audit: type=1400 audit(1707765587.885:365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit: BPF prog-id=47 op=LOAD Feb 12 19:19:47.900000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.916000 audit: BPF prog-id=48 op=LOAD Feb 12 19:19:47.916000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit: BPF prog-id=49 op=LOAD Feb 12 19:19:47.932000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit: BPF prog-id=50 op=LOAD Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit: BPF prog-id=51 op=LOAD Feb 12 19:19:47.949000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:19:47.949000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.966000 audit: BPF prog-id=52 op=LOAD Feb 12 19:19:47.966000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:19:47.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:47.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit: BPF prog-id=55 op=LOAD Feb 12 19:19:48.007000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.007000 audit: BPF prog-id=58 op=LOAD Feb 12 19:19:48.007000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit: BPF prog-id=59 op=LOAD Feb 12 19:19:48.009000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit: BPF prog-id=60 op=LOAD Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.009000 audit: BPF prog-id=61 op=LOAD Feb 12 19:19:48.009000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:19:48.009000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:19:48.032327 systemd[1]: Started kubelet.service. Feb 12 19:19:48.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:19:48.077213 kubelet[1904]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:19:48.077609 kubelet[1904]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:19:48.077755 kubelet[1904]: I0212 19:19:48.077721 1904 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:19:48.079092 kubelet[1904]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:19:48.079170 kubelet[1904]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:19:48.723962 kubelet[1904]: I0212 19:19:48.723932 1904 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:19:48.724104 kubelet[1904]: I0212 19:19:48.724093 1904 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:19:48.724385 kubelet[1904]: I0212 19:19:48.724369 1904 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:19:48.726531 kubelet[1904]: I0212 19:19:48.726500 1904 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:19:48.728442 kubelet[1904]: W0212 19:19:48.728427 1904 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:19:48.728998 kubelet[1904]: I0212 19:19:48.728983 1904 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:19:48.729292 kubelet[1904]: I0212 19:19:48.729281 1904 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:19:48.729428 kubelet[1904]: I0212 19:19:48.729417 1904 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:19:48.729554 kubelet[1904]: I0212 19:19:48.729543 1904 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:19:48.729609 kubelet[1904]: I0212 19:19:48.729600 1904 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:19:48.729755 kubelet[1904]: I0212 19:19:48.729743 1904 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:19:48.732541 kubelet[1904]: I0212 19:19:48.732518 1904 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:19:48.732541 kubelet[1904]: I0212 19:19:48.732542 1904 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:19:48.732641 kubelet[1904]: I0212 19:19:48.732567 1904 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:19:48.732641 kubelet[1904]: I0212 19:19:48.732585 1904 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:19:48.733223 kubelet[1904]: E0212 19:19:48.733197 1904 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:48.733269 kubelet[1904]: E0212 19:19:48.733261 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:48.733674 kubelet[1904]: I0212 19:19:48.733653 1904 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:19:48.734004 kubelet[1904]: W0212 19:19:48.733981 1904 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:19:48.734360 kubelet[1904]: I0212 19:19:48.734335 1904 server.go:1186] "Started kubelet" Feb 12 19:19:48.735348 kubelet[1904]: E0212 19:19:48.735333 1904 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:19:48.735448 kubelet[1904]: E0212 19:19:48.735439 1904 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:19:48.735000 audit[1904]: AVC avc: denied { mac_admin } for pid=1904 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.735000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:19:48.735000 audit[1904]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b81380 a1=4000d773c8 a2=4000b81350 a3=25 items=0 ppid=1 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.735000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:19:48.735000 audit[1904]: AVC avc: denied { mac_admin } for pid=1904 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.735000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:19:48.735000 audit[1904]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b36d00 a1=4000d773e0 a2=4000b81410 a3=25 items=0 ppid=1 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.735000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:19:48.735923 kubelet[1904]: I0212 19:19:48.735647 1904 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:19:48.735923 kubelet[1904]: I0212 19:19:48.735677 1904 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:19:48.735923 kubelet[1904]: I0212 19:19:48.735724 1904 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:19:48.739786 kubelet[1904]: I0212 19:19:48.739765 1904 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:19:48.739000 audit[1914]: NETFILTER_CFG table=mangle:6 family=2 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.739000 audit[1914]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe4d33390 a2=0 a3=1 items=0 ppid=1904 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:19:48.740044 kubelet[1904]: I0212 19:19:48.740021 1904 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:19:48.740649 kubelet[1904]: I0212 19:19:48.740629 1904 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:19:48.741814 kubelet[1904]: I0212 19:19:48.740008 1904 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:19:48.741000 audit[1915]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.741000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffd3012120 a2=0 a3=1 items=0 ppid=1904 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.741000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:19:48.745000 audit[1917]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.745000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffda408190 a2=0 a3=1 items=0 ppid=1904 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:19:48.749000 audit[1919]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.749000 audit[1919]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe91159d0 a2=0 a3=1 items=0 ppid=1904 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:19:48.764537 kubelet[1904]: W0212 19:19:48.764492 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:48.764751 kubelet[1904]: E0212 19:19:48.764737 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:48.771218 kubelet[1904]: W0212 19:19:48.771183 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:48.771218 kubelet[1904]: E0212 19:19:48.771211 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:48.771379 kubelet[1904]: W0212 19:19:48.771235 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:48.771379 kubelet[1904]: E0212 19:19:48.771243 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:48.771379 kubelet[1904]: E0212 19:19:48.771329 1904 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:48.771446 kubelet[1904]: E0212 19:19:48.771367 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13c25084c", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 734314572, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 734314572, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.772484 kubelet[1904]: E0212 19:19:48.772412 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13c360824", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 735428644, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 735428644, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.773290 kubelet[1904]: I0212 19:19:48.773242 1904 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:19:48.773290 kubelet[1904]: I0212 19:19:48.773288 1904 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:19:48.773362 kubelet[1904]: I0212 19:19:48.773305 1904 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:19:48.776845 kubelet[1904]: E0212 19:19:48.776784 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.777850 kubelet[1904]: E0212 19:19:48.777798 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.778684 kubelet[1904]: I0212 19:19:48.778666 1904 policy_none.go:49] "None policy: Start" Feb 12 19:19:48.779189 kubelet[1904]: E0212 19:19:48.779137 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.779551 kubelet[1904]: I0212 19:19:48.779538 1904 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:19:48.779646 kubelet[1904]: I0212 19:19:48.779636 1904 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:19:48.787396 systemd[1]: Created slice kubepods.slice. Feb 12 19:19:48.791277 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:19:48.794750 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:19:48.799981 kubelet[1904]: I0212 19:19:48.799952 1904 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:19:48.799000 audit[1904]: AVC avc: denied { mac_admin } for pid=1904 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:19:48.799000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:19:48.799000 audit[1904]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000fc8a80 a1=40006a6288 a2=4000fc8a50 a3=25 items=0 ppid=1 pid=1904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.799000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:19:48.800243 kubelet[1904]: I0212 19:19:48.800018 1904 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:19:48.800243 kubelet[1904]: I0212 19:19:48.800213 1904 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:19:48.801235 kubelet[1904]: E0212 19:19:48.801122 1904 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.12\" not found" Feb 12 19:19:48.802661 kubelet[1904]: E0212 19:19:48.802540 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c1402763af", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 801577903, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 801577903, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.841588 kubelet[1904]: I0212 19:19:48.841560 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:48.842587 kubelet[1904]: E0212 19:19:48.842558 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:48.842930 kubelet[1904]: E0212 19:19:48.842856 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 841510832, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.843640 kubelet[1904]: E0212 19:19:48.843576 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 841516113, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.844361 kubelet[1904]: E0212 19:19:48.844294 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 841518913, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:48.857000 audit[1926]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.857000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc935e340 a2=0 a3=1 items=0 ppid=1904 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.857000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:19:48.858000 audit[1927]: NETFILTER_CFG table=nat:11 family=2 entries=2 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.858000 audit[1927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff017caa0 a2=0 a3=1 items=0 ppid=1904 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.858000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:19:48.929000 audit[1930]: NETFILTER_CFG table=nat:12 family=2 entries=1 op=nft_register_rule pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.929000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffed215c40 a2=0 a3=1 items=0 ppid=1904 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:19:48.962000 audit[1933]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.962000 audit[1933]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffed99c6e0 a2=0 a3=1 items=0 ppid=1904 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:19:48.963000 audit[1934]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_chain pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.963000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc239aeb0 a2=0 a3=1 items=0 ppid=1904 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:19:48.964000 audit[1935]: NETFILTER_CFG table=nat:15 family=2 entries=1 op=nft_register_chain pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.964000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffccbfdc80 a2=0 a3=1 items=0 ppid=1904 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.964000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:19:48.966000 audit[1937]: NETFILTER_CFG table=nat:16 family=2 entries=1 op=nft_register_rule pid=1937 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.966000 audit[1937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcd1c8330 a2=0 a3=1 items=0 ppid=1904 pid=1937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:19:48.973065 kubelet[1904]: E0212 19:19:48.973043 1904 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:48.967000 audit[1939]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1939 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:48.967000 audit[1939]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffbcb58d0 a2=0 a3=1 items=0 ppid=1904 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:48.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:19:49.027000 audit[1942]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.027000 audit[1942]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffc7adcad0 a2=0 a3=1 items=0 ppid=1904 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:19:49.029000 audit[1944]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_rule pid=1944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.029000 audit[1944]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffce2d02f0 a2=0 a3=1 items=0 ppid=1904 pid=1944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:19:49.044129 kubelet[1904]: I0212 19:19:49.044101 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:49.045201 kubelet[1904]: E0212 19:19:49.045180 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:49.045307 kubelet[1904]: E0212 19:19:49.045216 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 44063218, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.046017 kubelet[1904]: E0212 19:19:49.045963 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 44067938, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.112000 audit[1947]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.112000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffdfe18e60 a2=0 a3=1 items=0 ppid=1904 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:19:49.113443 kubelet[1904]: I0212 19:19:49.113423 1904 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:19:49.114000 audit[1948]: NETFILTER_CFG table=mangle:21 family=10 entries=2 op=nft_register_chain pid=1948 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.114000 audit[1948]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffecb65a50 a2=0 a3=1 items=0 ppid=1904 pid=1948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.114000 audit[1949]: NETFILTER_CFG table=mangle:22 family=2 entries=1 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.114000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde9e7120 a2=0 a3=1 items=0 ppid=1904 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:19:49.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:19:49.114000 audit[1952]: NETFILTER_CFG table=nat:23 family=10 entries=2 op=nft_register_chain pid=1952 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.114000 audit[1952]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffffe1f38b0 a2=0 a3=1 items=0 ppid=1904 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.114000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:19:49.114000 audit[1951]: NETFILTER_CFG table=nat:24 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.114000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc0bd0ca0 a2=0 a3=1 items=0 ppid=1904 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:19:49.116000 audit[1953]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:19:49.116000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc151f470 a2=0 a3=1 items=0 ppid=1904 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:19:49.118000 audit[1955]: NETFILTER_CFG table=nat:26 family=10 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.118000 audit[1955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc7096560 a2=0 a3=1 items=0 ppid=1904 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.118000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:19:49.119000 audit[1956]: NETFILTER_CFG table=filter:27 family=10 entries=2 op=nft_register_chain pid=1956 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.119000 audit[1956]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffcaf560e0 a2=0 a3=1 items=0 ppid=1904 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.119000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:19:49.121000 audit[1958]: NETFILTER_CFG table=filter:28 family=10 entries=1 op=nft_register_rule pid=1958 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.121000 audit[1958]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffc70dc370 a2=0 a3=1 items=0 ppid=1904 pid=1958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.121000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:19:49.122000 audit[1959]: NETFILTER_CFG table=nat:29 family=10 entries=1 op=nft_register_chain pid=1959 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.122000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa42eab0 a2=0 a3=1 items=0 ppid=1904 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.122000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:19:49.123000 audit[1960]: NETFILTER_CFG table=nat:30 family=10 entries=1 op=nft_register_chain pid=1960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.123000 audit[1960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe62dbc40 a2=0 a3=1 items=0 ppid=1904 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:19:49.125000 audit[1962]: NETFILTER_CFG table=nat:31 family=10 entries=1 op=nft_register_rule pid=1962 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.125000 audit[1962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff077ca30 a2=0 a3=1 items=0 ppid=1904 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:19:49.126000 audit[1964]: NETFILTER_CFG table=nat:32 family=10 entries=2 op=nft_register_chain pid=1964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.126000 audit[1964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe471c5a0 a2=0 a3=1 items=0 ppid=1904 pid=1964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:19:49.128000 audit[1966]: NETFILTER_CFG table=nat:33 family=10 entries=1 op=nft_register_rule pid=1966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.128000 audit[1966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffde773c20 a2=0 a3=1 items=0 ppid=1904 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.128000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:19:49.130000 audit[1968]: NETFILTER_CFG table=nat:34 family=10 entries=1 op=nft_register_rule pid=1968 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.130000 audit[1968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=fffffe24e200 a2=0 a3=1 items=0 ppid=1904 pid=1968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:19:49.135829 kubelet[1904]: E0212 19:19:49.135741 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 44071738, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.179000 audit[1970]: NETFILTER_CFG table=nat:35 family=10 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.179000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=ffffe3860b80 a2=0 a3=1 items=0 ppid=1904 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:19:49.180785 kubelet[1904]: I0212 19:19:49.180759 1904 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:19:49.180785 kubelet[1904]: I0212 19:19:49.180786 1904 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:19:49.180850 kubelet[1904]: I0212 19:19:49.180805 1904 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:19:49.180850 kubelet[1904]: E0212 19:19:49.180844 1904 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:19:49.182234 kubelet[1904]: W0212 19:19:49.182205 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:49.182234 kubelet[1904]: E0212 19:19:49.182232 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:49.182000 audit[1971]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=1971 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.182000 audit[1971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5cfa8f0 a2=0 a3=1 items=0 ppid=1904 pid=1971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:19:49.183000 audit[1972]: NETFILTER_CFG table=nat:37 family=10 entries=1 op=nft_register_chain pid=1972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.183000 audit[1972]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcdd3cf10 a2=0 a3=1 items=0 ppid=1904 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:19:49.184000 audit[1973]: NETFILTER_CFG table=filter:38 family=10 entries=1 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:19:49.184000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0430f70 a2=0 a3=1 items=0 ppid=1904 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:19:49.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:19:49.374976 kubelet[1904]: E0212 19:19:49.374865 1904 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:49.445865 kubelet[1904]: I0212 19:19:49.445835 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:49.446726 kubelet[1904]: E0212 19:19:49.446708 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:49.447072 kubelet[1904]: E0212 19:19:49.447000 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 445798452, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.536316 kubelet[1904]: E0212 19:19:49.536228 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 445803372, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.733769 kubelet[1904]: E0212 19:19:49.733742 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:49.735798 kubelet[1904]: E0212 19:19:49.735713 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 49, 445806932, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:49.935766 kubelet[1904]: W0212 19:19:49.935734 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:49.935766 kubelet[1904]: E0212 19:19:49.935768 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:50.033314 kubelet[1904]: W0212 19:19:50.033206 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:50.033452 kubelet[1904]: E0212 19:19:50.033438 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:50.089679 kubelet[1904]: W0212 19:19:50.089646 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:50.089679 kubelet[1904]: E0212 19:19:50.089681 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:50.176153 kubelet[1904]: E0212 19:19:50.176115 1904 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:50.248452 kubelet[1904]: I0212 19:19:50.248417 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:50.249584 kubelet[1904]: E0212 19:19:50.249563 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:50.249844 kubelet[1904]: E0212 19:19:50.249739 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 50, 248382114, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:50.251380 kubelet[1904]: E0212 19:19:50.251308 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 50, 248386914, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:50.324499 kubelet[1904]: W0212 19:19:50.324409 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:50.324499 kubelet[1904]: E0212 19:19:50.324450 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:50.336371 kubelet[1904]: E0212 19:19:50.336280 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 50, 248391314, time.Local), Count:5, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:50.734135 kubelet[1904]: E0212 19:19:50.734109 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:51.734944 kubelet[1904]: E0212 19:19:51.734914 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:51.777487 kubelet[1904]: E0212 19:19:51.777455 1904 controller.go:146] failed to ensure lease exists, will retry in 3.2s, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:51.850623 kubelet[1904]: I0212 19:19:51.850599 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:51.851756 kubelet[1904]: E0212 19:19:51.851681 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 51, 850555944, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:51.852031 kubelet[1904]: E0212 19:19:51.851922 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:51.852829 kubelet[1904]: E0212 19:19:51.852776 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 51, 850565025, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:51.853651 kubelet[1904]: E0212 19:19:51.853601 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 51, 850568385, time.Local), Count:6, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:51.942001 kubelet[1904]: W0212 19:19:51.941955 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:51.942116 kubelet[1904]: E0212 19:19:51.942009 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:52.369186 kubelet[1904]: W0212 19:19:52.369158 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:52.369384 kubelet[1904]: E0212 19:19:52.369372 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:52.604266 kubelet[1904]: W0212 19:19:52.604220 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:52.604445 kubelet[1904]: E0212 19:19:52.604433 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:52.735984 kubelet[1904]: E0212 19:19:52.735962 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:52.849643 kubelet[1904]: W0212 19:19:52.849609 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:52.849643 kubelet[1904]: E0212 19:19:52.849643 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:53.736903 kubelet[1904]: E0212 19:19:53.736862 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:54.737172 kubelet[1904]: E0212 19:19:54.737137 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:54.978466 kubelet[1904]: E0212 19:19:54.978432 1904 controller.go:146] failed to ensure lease exists, will retry in 6.4s, error: leases.coordination.k8s.io "10.200.20.12" is forbidden: User "system:anonymous" cannot get resource "leases" in API group "coordination.k8s.io" in the namespace "kube-node-lease" Feb 12 19:19:55.053842 kubelet[1904]: I0212 19:19:55.053554 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:19:55.054661 kubelet[1904]: E0212 19:19:55.054640 1904 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:19:55.054770 kubelet[1904]: E0212 19:19:55.054648 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f157a", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771673466, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 55, 53496998, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f157a" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:55.055614 kubelet[1904]: E0212 19:19:55.055553 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f2a93", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771678867, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 55, 53510319, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f2a93" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:55.056304 kubelet[1904]: E0212 19:19:55.056234 1904 event.go:267] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b333c13e5f634b", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 19, 48, 771693387, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 19, 55, 53513799, time.Local), Count:7, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'events "10.200.20.12.17b333c13e5f634b" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:19:55.737373 kubelet[1904]: E0212 19:19:55.737343 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:56.738090 kubelet[1904]: E0212 19:19:56.738059 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:57.344546 kubelet[1904]: W0212 19:19:57.344512 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:57.344723 kubelet[1904]: E0212 19:19:57.344713 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:19:57.387893 kubelet[1904]: W0212 19:19:57.387865 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:57.388029 kubelet[1904]: E0212 19:19:57.388020 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:19:57.461685 kubelet[1904]: W0212 19:19:57.461649 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:57.461685 kubelet[1904]: E0212 19:19:57.461692 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:19:57.738974 kubelet[1904]: E0212 19:19:57.738940 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:58.001703 kubelet[1904]: W0212 19:19:58.001431 1904 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:58.001846 kubelet[1904]: E0212 19:19:58.001833 1904 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:19:58.726134 kubelet[1904]: I0212 19:19:58.726094 1904 transport.go:135] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:19:58.740475 kubelet[1904]: E0212 19:19:58.740448 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:19:58.801352 kubelet[1904]: E0212 19:19:58.801324 1904 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.12\" not found" Feb 12 19:19:59.107289 kubelet[1904]: E0212 19:19:59.106940 1904 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.12" not found Feb 12 19:19:59.741320 kubelet[1904]: E0212 19:19:59.741292 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:00.174444 kubelet[1904]: E0212 19:20:00.174147 1904 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.12" not found Feb 12 19:20:00.741846 kubelet[1904]: E0212 19:20:00.741813 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:01.382122 kubelet[1904]: E0212 19:20:01.382095 1904 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.12\" not found" node="10.200.20.12" Feb 12 19:20:01.455474 kubelet[1904]: I0212 19:20:01.455449 1904 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:20:01.576046 kubelet[1904]: I0212 19:20:01.576016 1904 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.12" Feb 12 19:20:01.587288 kubelet[1904]: E0212 19:20:01.587254 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:01.688102 kubelet[1904]: E0212 19:20:01.687751 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:01.742284 kubelet[1904]: E0212 19:20:01.742265 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:01.788376 kubelet[1904]: E0212 19:20:01.788354 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:01.888985 kubelet[1904]: E0212 19:20:01.888957 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:01.989560 kubelet[1904]: E0212 19:20:01.989531 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.048086 sudo[1653]: pam_unix(sudo:session): session closed for user root Feb 12 19:20:02.077065 kernel: kauditd_printk_skb: 342 callbacks suppressed Feb 12 19:20:02.077091 kernel: audit: type=1106 audit(1707765602.046:535): pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.077108 kernel: audit: type=1104 audit(1707765602.046:536): pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.046000 audit[1653]: USER_END pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.046000 audit[1653]: CRED_DISP pid=1653 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.097987 kubelet[1904]: E0212 19:20:02.097952 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.127591 sshd[1650]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:02.127000 audit[1650]: USER_END pid=1650 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.157219 systemd[1]: sshd@6-10.200.20.12:22-10.200.12.6:46602.service: Deactivated successfully. Feb 12 19:20:02.127000 audit[1650]: CRED_DISP pid=1650 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.180734 kernel: audit: type=1106 audit(1707765602.127:537): pid=1650 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.180820 kernel: audit: type=1104 audit(1707765602.127:538): pid=1650 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.158000 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:20:02.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:46602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.181302 systemd-logind[1336]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:20:02.202997 kernel: audit: type=1131 audit(1707765602.156:539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:46602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.203525 kubelet[1904]: E0212 19:20:02.203224 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.204192 systemd-logind[1336]: Removed session 9. Feb 12 19:20:02.303784 kubelet[1904]: E0212 19:20:02.303681 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.404344 kubelet[1904]: E0212 19:20:02.404312 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.504875 kubelet[1904]: E0212 19:20:02.504850 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.605364 kubelet[1904]: E0212 19:20:02.605299 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.705930 kubelet[1904]: E0212 19:20:02.705902 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.742515 kubelet[1904]: E0212 19:20:02.742491 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:02.806710 kubelet[1904]: E0212 19:20:02.806688 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:02.907328 kubelet[1904]: E0212 19:20:02.907266 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.007917 kubelet[1904]: E0212 19:20:03.007887 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.108543 kubelet[1904]: E0212 19:20:03.108520 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.209199 kubelet[1904]: E0212 19:20:03.209163 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.309901 kubelet[1904]: E0212 19:20:03.309880 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.410374 kubelet[1904]: E0212 19:20:03.410353 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.510999 kubelet[1904]: E0212 19:20:03.510925 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.611590 kubelet[1904]: E0212 19:20:03.611565 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.712155 kubelet[1904]: E0212 19:20:03.712131 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.742787 kubelet[1904]: E0212 19:20:03.742765 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:03.812854 kubelet[1904]: E0212 19:20:03.812771 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:03.913663 kubelet[1904]: E0212 19:20:03.913635 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.014306 kubelet[1904]: E0212 19:20:04.014278 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.114996 kubelet[1904]: E0212 19:20:04.114905 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.215655 kubelet[1904]: E0212 19:20:04.215626 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.316352 kubelet[1904]: E0212 19:20:04.316328 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.417010 kubelet[1904]: E0212 19:20:04.416924 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.517578 kubelet[1904]: E0212 19:20:04.517542 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.618201 kubelet[1904]: E0212 19:20:04.618172 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.718858 kubelet[1904]: E0212 19:20:04.718825 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.743562 kubelet[1904]: E0212 19:20:04.743525 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:04.819467 kubelet[1904]: E0212 19:20:04.819437 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:04.920073 kubelet[1904]: E0212 19:20:04.920047 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.020692 kubelet[1904]: E0212 19:20:05.020621 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.121202 kubelet[1904]: E0212 19:20:05.121171 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.221693 kubelet[1904]: E0212 19:20:05.221671 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.322598 kubelet[1904]: E0212 19:20:05.322530 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.423298 kubelet[1904]: E0212 19:20:05.423277 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.523981 kubelet[1904]: E0212 19:20:05.523963 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.624704 kubelet[1904]: E0212 19:20:05.624640 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.725377 kubelet[1904]: E0212 19:20:05.725356 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.743999 kubelet[1904]: E0212 19:20:05.743982 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:05.826539 kubelet[1904]: E0212 19:20:05.826516 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:05.927227 kubelet[1904]: E0212 19:20:05.927160 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.027857 kubelet[1904]: E0212 19:20:06.027835 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.128900 kubelet[1904]: E0212 19:20:06.128876 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.229676 kubelet[1904]: E0212 19:20:06.229656 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.330354 kubelet[1904]: E0212 19:20:06.330334 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.430965 kubelet[1904]: E0212 19:20:06.430947 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.532016 kubelet[1904]: E0212 19:20:06.531929 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.632356 kubelet[1904]: E0212 19:20:06.632332 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.733001 kubelet[1904]: E0212 19:20:06.732981 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.744384 kubelet[1904]: E0212 19:20:06.744357 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:06.833625 kubelet[1904]: E0212 19:20:06.833563 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:06.934117 kubelet[1904]: E0212 19:20:06.934094 1904 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"10.200.20.12\" not found" Feb 12 19:20:07.035005 kubelet[1904]: I0212 19:20:07.034984 1904 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:20:07.035624 env[1349]: time="2024-02-12T19:20:07.035573349Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:20:07.036072 kubelet[1904]: I0212 19:20:07.036052 1904 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:20:07.743863 kubelet[1904]: I0212 19:20:07.743830 1904 apiserver.go:52] "Watching apiserver" Feb 12 19:20:07.744914 kubelet[1904]: E0212 19:20:07.744897 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:07.746282 kubelet[1904]: I0212 19:20:07.746237 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:20:07.746442 kubelet[1904]: I0212 19:20:07.746428 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:20:07.746535 kubelet[1904]: I0212 19:20:07.746524 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:20:07.747176 kubelet[1904]: E0212 19:20:07.747150 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:07.750701 systemd[1]: Created slice kubepods-besteffort-poda9d8c268_0084_4ed9_8687_57ecc35411c5.slice. Feb 12 19:20:07.761922 systemd[1]: Created slice kubepods-besteffort-pod1750760d_ef1d_43eb_876a_9186bf12599c.slice. Feb 12 19:20:07.840750 kubelet[1904]: I0212 19:20:07.840719 1904 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:20:07.938683 kubelet[1904]: I0212 19:20:07.938657 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-var-lib-calico\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.938880 kubelet[1904]: I0212 19:20:07.938869 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a9d8c268-0084-4ed9-8687-57ecc35411c5-xtables-lock\") pod \"kube-proxy-2ckk2\" (UID: \"a9d8c268-0084-4ed9-8687-57ecc35411c5\") " pod="kube-system/kube-proxy-2ckk2" Feb 12 19:20:07.939010 kubelet[1904]: I0212 19:20:07.938984 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f85f5b27-d91c-49c8-8bb3-7b22528b74f5-varrun\") pod \"csi-node-driver-ft5z2\" (UID: \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\") " pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:07.939049 kubelet[1904]: I0212 19:20:07.939030 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-policysync\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939074 kubelet[1904]: I0212 19:20:07.939054 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1750760d-ef1d-43eb-876a-9186bf12599c-tigera-ca-bundle\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939098 kubelet[1904]: I0212 19:20:07.939075 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-var-run-calico\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939098 kubelet[1904]: I0212 19:20:07.939098 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f85f5b27-d91c-49c8-8bb3-7b22528b74f5-registration-dir\") pod \"csi-node-driver-ft5z2\" (UID: \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\") " pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:07.939148 kubelet[1904]: I0212 19:20:07.939117 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/1750760d-ef1d-43eb-876a-9186bf12599c-node-certs\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939148 kubelet[1904]: I0212 19:20:07.939139 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-klssj\" (UniqueName: \"kubernetes.io/projected/1750760d-ef1d-43eb-876a-9186bf12599c-kube-api-access-klssj\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939197 kubelet[1904]: I0212 19:20:07.939159 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a9d8c268-0084-4ed9-8687-57ecc35411c5-kube-proxy\") pod \"kube-proxy-2ckk2\" (UID: \"a9d8c268-0084-4ed9-8687-57ecc35411c5\") " pod="kube-system/kube-proxy-2ckk2" Feb 12 19:20:07.939197 kubelet[1904]: I0212 19:20:07.939181 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a9d8c268-0084-4ed9-8687-57ecc35411c5-lib-modules\") pod \"kube-proxy-2ckk2\" (UID: \"a9d8c268-0084-4ed9-8687-57ecc35411c5\") " pod="kube-system/kube-proxy-2ckk2" Feb 12 19:20:07.939240 kubelet[1904]: I0212 19:20:07.939200 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wc9qv\" (UniqueName: \"kubernetes.io/projected/a9d8c268-0084-4ed9-8687-57ecc35411c5-kube-api-access-wc9qv\") pod \"kube-proxy-2ckk2\" (UID: \"a9d8c268-0084-4ed9-8687-57ecc35411c5\") " pod="kube-system/kube-proxy-2ckk2" Feb 12 19:20:07.939240 kubelet[1904]: I0212 19:20:07.939220 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f85f5b27-d91c-49c8-8bb3-7b22528b74f5-kubelet-dir\") pod \"csi-node-driver-ft5z2\" (UID: \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\") " pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:07.939240 kubelet[1904]: I0212 19:20:07.939240 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bbwrs\" (UniqueName: \"kubernetes.io/projected/f85f5b27-d91c-49c8-8bb3-7b22528b74f5-kube-api-access-bbwrs\") pod \"csi-node-driver-ft5z2\" (UID: \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\") " pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:07.939333 kubelet[1904]: I0212 19:20:07.939275 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-lib-modules\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939333 kubelet[1904]: I0212 19:20:07.939296 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-cni-bin-dir\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939333 kubelet[1904]: I0212 19:20:07.939318 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-cni-net-dir\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939401 kubelet[1904]: I0212 19:20:07.939338 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f85f5b27-d91c-49c8-8bb3-7b22528b74f5-socket-dir\") pod \"csi-node-driver-ft5z2\" (UID: \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\") " pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:07.939401 kubelet[1904]: I0212 19:20:07.939358 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-xtables-lock\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939401 kubelet[1904]: I0212 19:20:07.939379 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-cni-log-dir\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939401 kubelet[1904]: I0212 19:20:07.939399 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/1750760d-ef1d-43eb-876a-9186bf12599c-flexvol-driver-host\") pod \"calico-node-cpxhz\" (UID: \"1750760d-ef1d-43eb-876a-9186bf12599c\") " pod="calico-system/calico-node-cpxhz" Feb 12 19:20:07.939487 kubelet[1904]: I0212 19:20:07.939414 1904 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:20:08.041730 kubelet[1904]: E0212 19:20:08.041635 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.041730 kubelet[1904]: W0212 19:20:08.041658 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.041730 kubelet[1904]: E0212 19:20:08.041690 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.042161 kubelet[1904]: E0212 19:20:08.042147 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.042263 kubelet[1904]: W0212 19:20:08.042232 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.042325 kubelet[1904]: E0212 19:20:08.042315 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.042525 kubelet[1904]: E0212 19:20:08.042515 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.042605 kubelet[1904]: W0212 19:20:08.042594 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.042659 kubelet[1904]: E0212 19:20:08.042650 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.042831 kubelet[1904]: E0212 19:20:08.042821 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.042901 kubelet[1904]: W0212 19:20:08.042889 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.042954 kubelet[1904]: E0212 19:20:08.042946 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.043148 kubelet[1904]: E0212 19:20:08.043138 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.043216 kubelet[1904]: W0212 19:20:08.043205 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.043293 kubelet[1904]: E0212 19:20:08.043283 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.043858 kubelet[1904]: E0212 19:20:08.043823 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.043858 kubelet[1904]: W0212 19:20:08.043844 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.043858 kubelet[1904]: E0212 19:20:08.043859 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044064 kubelet[1904]: E0212 19:20:08.044040 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044064 kubelet[1904]: W0212 19:20:08.044057 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044131 kubelet[1904]: E0212 19:20:08.044073 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044228 kubelet[1904]: E0212 19:20:08.044205 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044228 kubelet[1904]: W0212 19:20:08.044222 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044318 kubelet[1904]: E0212 19:20:08.044235 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044405 kubelet[1904]: E0212 19:20:08.044386 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044405 kubelet[1904]: W0212 19:20:08.044399 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044458 kubelet[1904]: E0212 19:20:08.044411 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044592 kubelet[1904]: E0212 19:20:08.044572 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044592 kubelet[1904]: W0212 19:20:08.044585 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044653 kubelet[1904]: E0212 19:20:08.044596 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044749 kubelet[1904]: E0212 19:20:08.044729 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044749 kubelet[1904]: W0212 19:20:08.044741 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044749 kubelet[1904]: E0212 19:20:08.044751 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.044872 kubelet[1904]: E0212 19:20:08.044851 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.044872 kubelet[1904]: W0212 19:20:08.044868 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.044930 kubelet[1904]: E0212 19:20:08.044878 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045002 kubelet[1904]: E0212 19:20:08.044985 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045002 kubelet[1904]: W0212 19:20:08.044996 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045056 kubelet[1904]: E0212 19:20:08.045005 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045139 kubelet[1904]: E0212 19:20:08.045122 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045139 kubelet[1904]: W0212 19:20:08.045133 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045202 kubelet[1904]: E0212 19:20:08.045143 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045288 kubelet[1904]: E0212 19:20:08.045271 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045288 kubelet[1904]: W0212 19:20:08.045285 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045343 kubelet[1904]: E0212 19:20:08.045297 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045434 kubelet[1904]: E0212 19:20:08.045414 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045434 kubelet[1904]: W0212 19:20:08.045428 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045512 kubelet[1904]: E0212 19:20:08.045438 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045558 kubelet[1904]: E0212 19:20:08.045540 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045558 kubelet[1904]: W0212 19:20:08.045552 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045610 kubelet[1904]: E0212 19:20:08.045562 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045698 kubelet[1904]: E0212 19:20:08.045680 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045698 kubelet[1904]: W0212 19:20:08.045692 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045763 kubelet[1904]: E0212 19:20:08.045703 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.045919 kubelet[1904]: E0212 19:20:08.045893 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.045919 kubelet[1904]: W0212 19:20:08.045908 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.045988 kubelet[1904]: E0212 19:20:08.045927 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.046065 kubelet[1904]: E0212 19:20:08.046047 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.046065 kubelet[1904]: W0212 19:20:08.046060 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.046126 kubelet[1904]: E0212 19:20:08.046071 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.046191 kubelet[1904]: E0212 19:20:08.046173 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.046191 kubelet[1904]: W0212 19:20:08.046185 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.046260 kubelet[1904]: E0212 19:20:08.046194 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.046451 kubelet[1904]: E0212 19:20:08.046429 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.046451 kubelet[1904]: W0212 19:20:08.046446 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.046521 kubelet[1904]: E0212 19:20:08.046460 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.046979 kubelet[1904]: E0212 19:20:08.046952 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.046979 kubelet[1904]: W0212 19:20:08.046971 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.047050 kubelet[1904]: E0212 19:20:08.046986 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.051620 kubelet[1904]: E0212 19:20:08.051604 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.051727 kubelet[1904]: W0212 19:20:08.051713 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.051786 kubelet[1904]: E0212 19:20:08.051777 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.141440 kubelet[1904]: E0212 19:20:08.141408 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.141440 kubelet[1904]: W0212 19:20:08.141433 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.141572 kubelet[1904]: E0212 19:20:08.141453 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.141633 kubelet[1904]: E0212 19:20:08.141613 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.141633 kubelet[1904]: W0212 19:20:08.141631 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.141717 kubelet[1904]: E0212 19:20:08.141646 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.141810 kubelet[1904]: E0212 19:20:08.141795 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.141810 kubelet[1904]: W0212 19:20:08.141807 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.141866 kubelet[1904]: E0212 19:20:08.141818 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.242262 kubelet[1904]: E0212 19:20:08.242223 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.242424 kubelet[1904]: W0212 19:20:08.242409 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.242499 kubelet[1904]: E0212 19:20:08.242487 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.242752 kubelet[1904]: E0212 19:20:08.242741 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.242831 kubelet[1904]: W0212 19:20:08.242819 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.242883 kubelet[1904]: E0212 19:20:08.242875 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.243121 kubelet[1904]: E0212 19:20:08.243110 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.243200 kubelet[1904]: W0212 19:20:08.243188 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.243269 kubelet[1904]: E0212 19:20:08.243260 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.343851 kubelet[1904]: E0212 19:20:08.343772 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.343985 kubelet[1904]: W0212 19:20:08.343970 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.344045 kubelet[1904]: E0212 19:20:08.344036 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.344406 kubelet[1904]: E0212 19:20:08.344393 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.344504 kubelet[1904]: W0212 19:20:08.344492 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.344562 kubelet[1904]: E0212 19:20:08.344553 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.344775 kubelet[1904]: E0212 19:20:08.344765 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.344846 kubelet[1904]: W0212 19:20:08.344836 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.344901 kubelet[1904]: E0212 19:20:08.344891 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.445383 kubelet[1904]: E0212 19:20:08.445354 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.445383 kubelet[1904]: W0212 19:20:08.445377 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.445552 kubelet[1904]: E0212 19:20:08.445397 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.445552 kubelet[1904]: E0212 19:20:08.445543 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.445552 kubelet[1904]: W0212 19:20:08.445551 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.445618 kubelet[1904]: E0212 19:20:08.445563 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.445711 kubelet[1904]: E0212 19:20:08.445698 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.445711 kubelet[1904]: W0212 19:20:08.445710 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.445772 kubelet[1904]: E0212 19:20:08.445720 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.546352 kubelet[1904]: E0212 19:20:08.546327 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.546504 kubelet[1904]: W0212 19:20:08.546489 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.546566 kubelet[1904]: E0212 19:20:08.546557 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.546762 kubelet[1904]: E0212 19:20:08.546752 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.546840 kubelet[1904]: W0212 19:20:08.546829 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.546901 kubelet[1904]: E0212 19:20:08.546892 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.547163 kubelet[1904]: E0212 19:20:08.547152 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.547231 kubelet[1904]: W0212 19:20:08.547219 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.547312 kubelet[1904]: E0212 19:20:08.547302 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.558835 kubelet[1904]: E0212 19:20:08.558818 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.558991 kubelet[1904]: W0212 19:20:08.558975 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.559079 kubelet[1904]: E0212 19:20:08.559069 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.647963 kubelet[1904]: E0212 19:20:08.647879 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.648089 kubelet[1904]: W0212 19:20:08.648073 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.648162 kubelet[1904]: E0212 19:20:08.648153 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.648434 kubelet[1904]: E0212 19:20:08.648416 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.648511 kubelet[1904]: W0212 19:20:08.648499 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.648573 kubelet[1904]: E0212 19:20:08.648557 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.660902 env[1349]: time="2024-02-12T19:20:08.660835792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2ckk2,Uid:a9d8c268-0084-4ed9-8687-57ecc35411c5,Namespace:kube-system,Attempt:0,}" Feb 12 19:20:08.732917 kubelet[1904]: E0212 19:20:08.732887 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:08.746275 kubelet[1904]: E0212 19:20:08.746238 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:08.748949 kubelet[1904]: E0212 19:20:08.748929 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.748949 kubelet[1904]: W0212 19:20:08.748946 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.749031 kubelet[1904]: E0212 19:20:08.748963 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.749136 kubelet[1904]: E0212 19:20:08.749122 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.749136 kubelet[1904]: W0212 19:20:08.749134 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.749214 kubelet[1904]: E0212 19:20:08.749146 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.758076 kubelet[1904]: E0212 19:20:08.758055 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.758209 kubelet[1904]: W0212 19:20:08.758196 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.758292 kubelet[1904]: E0212 19:20:08.758282 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.850380 kubelet[1904]: E0212 19:20:08.850354 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.850536 kubelet[1904]: W0212 19:20:08.850520 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.850646 kubelet[1904]: E0212 19:20:08.850635 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.951074 kubelet[1904]: E0212 19:20:08.951056 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.951211 kubelet[1904]: W0212 19:20:08.951196 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.951289 kubelet[1904]: E0212 19:20:08.951278 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.958635 kubelet[1904]: E0212 19:20:08.958522 1904 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:20:08.958635 kubelet[1904]: W0212 19:20:08.958544 1904 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:20:08.958635 kubelet[1904]: E0212 19:20:08.958563 1904 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:20:08.975294 env[1349]: time="2024-02-12T19:20:08.975053524Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpxhz,Uid:1750760d-ef1d-43eb-876a-9186bf12599c,Namespace:calico-system,Attempt:0,}" Feb 12 19:20:09.181682 kubelet[1904]: E0212 19:20:09.181626 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:09.746795 kubelet[1904]: E0212 19:20:09.746738 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:10.101387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2710630458.mount: Deactivated successfully. Feb 12 19:20:10.138565 env[1349]: time="2024-02-12T19:20:10.138522314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.143183 env[1349]: time="2024-02-12T19:20:10.143144682Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.155537 env[1349]: time="2024-02-12T19:20:10.155487449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.160206 env[1349]: time="2024-02-12T19:20:10.160167616Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.164002 env[1349]: time="2024-02-12T19:20:10.163958236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.169671 env[1349]: time="2024-02-12T19:20:10.169640787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.172997 env[1349]: time="2024-02-12T19:20:10.172959855Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.178883 env[1349]: time="2024-02-12T19:20:10.178851123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:10.242284 env[1349]: time="2024-02-12T19:20:10.239729851Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:10.242284 env[1349]: time="2024-02-12T19:20:10.239771290Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:10.242284 env[1349]: time="2024-02-12T19:20:10.239781770Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:10.242284 env[1349]: time="2024-02-12T19:20:10.240144244Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08 pid=2044 runtime=io.containerd.runc.v2 Feb 12 19:20:10.242500 env[1349]: time="2024-02-12T19:20:10.240560278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:10.242500 env[1349]: time="2024-02-12T19:20:10.240613037Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:10.242500 env[1349]: time="2024-02-12T19:20:10.240625237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:10.242500 env[1349]: time="2024-02-12T19:20:10.240785194Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2808189b25c2ba7791d503645f5b311607383e03f28fae9aefaca6676d004f2 pid=2043 runtime=io.containerd.runc.v2 Feb 12 19:20:10.259039 systemd[1]: Started cri-containerd-b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08.scope. Feb 12 19:20:10.268703 systemd[1]: Started cri-containerd-e2808189b25c2ba7791d503645f5b311607383e03f28fae9aefaca6676d004f2.scope. Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.318303 kernel: audit: type=1400 audit(1707765610.275:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.318416 kernel: audit: type=1400 audit(1707765610.275:541): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.338577 kernel: audit: type=1400 audit(1707765610.275:542): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.340120 env[1349]: time="2024-02-12T19:20:10.340078441Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-cpxhz,Uid:1750760d-ef1d-43eb-876a-9186bf12599c,Namespace:calico-system,Attempt:0,} returns sandbox id \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\"" Feb 12 19:20:10.342130 env[1349]: time="2024-02-12T19:20:10.342100609Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.370011 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:20:10.370140 kernel: audit: type=1400 audit(1707765610.275:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.370172 kernel: audit: audit_lost=34 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:20:10.370194 kernel: audit: type=1400 audit(1707765610.275:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.393107 kernel: audit: backlog limit exceeded Feb 12 19:20:10.393215 kernel: audit: type=1400 audit(1707765610.275:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.417044 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.294000 audit: BPF prog-id=62 op=LOAD Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2044 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613566343163356363613535656561363731373261323866393661 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2044 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613566343163356363613535656561363731373261323866393661 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit: BPF prog-id=63 op=LOAD Feb 12 19:20:10.296000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2044 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613566343163356363613535656561363731373261323866393661 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit: BPF prog-id=64 op=LOAD Feb 12 19:20:10.296000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2044 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613566343163356363613535656561363731373261323866393661 Feb 12 19:20:10.296000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:20:10.296000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { perfmon } for pid=2067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit[2067]: AVC avc: denied { bpf } for pid=2067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.296000 audit: BPF prog-id=65 op=LOAD Feb 12 19:20:10.296000 audit[2067]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2044 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235613566343163356363613535656561363731373261323866393661 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2043 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383038313839623235633262613737393164353033363435663562 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2043 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383038313839623235633262613737393164353033363435663562 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.419000 audit: BPF prog-id=67 op=LOAD Feb 12 19:20:10.419000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2043 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383038313839623235633262613737393164353033363435663562 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit: BPF prog-id=68 op=LOAD Feb 12 19:20:10.420000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2043 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383038313839623235633262613737393164353033363435663562 Feb 12 19:20:10.420000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:20:10.420000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { perfmon } for pid=2066 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit[2066]: AVC avc: denied { bpf } for pid=2066 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:10.420000 audit: BPF prog-id=69 op=LOAD Feb 12 19:20:10.420000 audit[2066]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2043 pid=2066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:10.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383038313839623235633262613737393164353033363435663562 Feb 12 19:20:10.432094 env[1349]: time="2024-02-12T19:20:10.432046722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2ckk2,Uid:a9d8c268-0084-4ed9-8687-57ecc35411c5,Namespace:kube-system,Attempt:0,} returns sandbox id \"e2808189b25c2ba7791d503645f5b311607383e03f28fae9aefaca6676d004f2\"" Feb 12 19:20:10.747792 kubelet[1904]: E0212 19:20:10.747739 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:11.181931 kubelet[1904]: E0212 19:20:11.181283 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:11.748369 kubelet[1904]: E0212 19:20:11.748333 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:11.851899 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1494721276.mount: Deactivated successfully. Feb 12 19:20:11.998662 env[1349]: time="2024-02-12T19:20:11.998551828Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:12.005668 env[1349]: time="2024-02-12T19:20:12.005613843Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:12.009492 env[1349]: time="2024-02-12T19:20:12.009454306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:12.014297 env[1349]: time="2024-02-12T19:20:12.014253715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:12.014615 env[1349]: time="2024-02-12T19:20:12.014586350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:20:12.016076 env[1349]: time="2024-02-12T19:20:12.016036808Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 19:20:12.017006 env[1349]: time="2024-02-12T19:20:12.016961475Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:20:12.043762 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3064020458.mount: Deactivated successfully. Feb 12 19:20:12.059774 env[1349]: time="2024-02-12T19:20:12.059725280Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608\"" Feb 12 19:20:12.060518 env[1349]: time="2024-02-12T19:20:12.060468149Z" level=info msg="StartContainer for \"d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608\"" Feb 12 19:20:12.075745 systemd[1]: Started cri-containerd-d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608.scope. Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436326339393265353863303831343938356334313635386162343535 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit: BPF prog-id=70 op=LOAD Feb 12 19:20:12.090000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436326339393265353863303831343938356334313635386162343535 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit: BPF prog-id=71 op=LOAD Feb 12 19:20:12.090000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436326339393265353863303831343938356334313635386162343535 Feb 12 19:20:12.090000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:20:12.090000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:12.090000 audit: BPF prog-id=72 op=LOAD Feb 12 19:20:12.090000 audit[2121]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:12.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436326339393265353863303831343938356334313635386162343535 Feb 12 19:20:12.115026 env[1349]: time="2024-02-12T19:20:12.114981181Z" level=info msg="StartContainer for \"d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608\" returns successfully" Feb 12 19:20:12.115095 systemd[1]: cri-containerd-d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608.scope: Deactivated successfully. Feb 12 19:20:12.118000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:20:12.133555 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608-rootfs.mount: Deactivated successfully. Feb 12 19:20:12.233635 env[1349]: time="2024-02-12T19:20:12.233577942Z" level=info msg="shim disconnected" id=d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608 Feb 12 19:20:12.233635 env[1349]: time="2024-02-12T19:20:12.233628301Z" level=warning msg="cleaning up after shim disconnected" id=d62c992e58c0814985c41658ab455230d410654e6e28358315e68a0db4577608 namespace=k8s.io Feb 12 19:20:12.233635 env[1349]: time="2024-02-12T19:20:12.233638621Z" level=info msg="cleaning up dead shim" Feb 12 19:20:12.240398 env[1349]: time="2024-02-12T19:20:12.240345442Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:20:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2159 runtime=io.containerd.runc.v2\n" Feb 12 19:20:12.749002 kubelet[1904]: E0212 19:20:12.748964 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:13.182719 kubelet[1904]: E0212 19:20:13.182487 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:13.250014 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4259071265.mount: Deactivated successfully. Feb 12 19:20:13.749208 kubelet[1904]: E0212 19:20:13.749172 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:13.773279 env[1349]: time="2024-02-12T19:20:13.773131370Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:13.779410 env[1349]: time="2024-02-12T19:20:13.779368560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:13.783985 env[1349]: time="2024-02-12T19:20:13.783951893Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:13.786767 env[1349]: time="2024-02-12T19:20:13.786738453Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:13.787123 env[1349]: time="2024-02-12T19:20:13.787094728Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 12 19:20:13.788503 env[1349]: time="2024-02-12T19:20:13.788461868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:20:13.789402 env[1349]: time="2024-02-12T19:20:13.789377975Z" level=info msg="CreateContainer within sandbox \"e2808189b25c2ba7791d503645f5b311607383e03f28fae9aefaca6676d004f2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:20:13.817353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4122770011.mount: Deactivated successfully. Feb 12 19:20:13.821020 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3520871920.mount: Deactivated successfully. Feb 12 19:20:13.839736 env[1349]: time="2024-02-12T19:20:13.839687648Z" level=info msg="CreateContainer within sandbox \"e2808189b25c2ba7791d503645f5b311607383e03f28fae9aefaca6676d004f2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"1dbd866b40191125a018b67b0b502deb83a499f537de2f36371f5ddfad3796bf\"" Feb 12 19:20:13.840397 env[1349]: time="2024-02-12T19:20:13.840370799Z" level=info msg="StartContainer for \"1dbd866b40191125a018b67b0b502deb83a499f537de2f36371f5ddfad3796bf\"" Feb 12 19:20:13.854676 systemd[1]: Started cri-containerd-1dbd866b40191125a018b67b0b502deb83a499f537de2f36371f5ddfad3796bf.scope. Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2043 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626438363662343031393131323561303138623637623062353032 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.869000 audit: BPF prog-id=73 op=LOAD Feb 12 19:20:13.869000 audit[2184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2043 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626438363662343031393131323561303138623637623062353032 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.870000 audit: BPF prog-id=74 op=LOAD Feb 12 19:20:13.870000 audit[2184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2043 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626438363662343031393131323561303138623637623062353032 Feb 12 19:20:13.871000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:20:13.871000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { perfmon } for pid=2184 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit[2184]: AVC avc: denied { bpf } for pid=2184 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:13.871000 audit: BPF prog-id=75 op=LOAD Feb 12 19:20:13.871000 audit[2184]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2043 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164626438363662343031393131323561303138623637623062353032 Feb 12 19:20:13.890677 env[1349]: time="2024-02-12T19:20:13.890630273Z" level=info msg="StartContainer for \"1dbd866b40191125a018b67b0b502deb83a499f537de2f36371f5ddfad3796bf\" returns successfully" Feb 12 19:20:13.932000 audit[2232]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:13.932000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee0bdf20 a2=0 a3=ffff8a3be6c0 items=0 ppid=2194 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.932000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:20:13.933000 audit[2233]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:13.933000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf46b3e0 a2=0 a3=ffff9b5c06c0 items=0 ppid=2194 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.933000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:20:13.934000 audit[2234]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:13.934000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffc0692b0 a2=0 a3=ffff8ce816c0 items=0 ppid=2194 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:20:13.934000 audit[2235]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:13.934000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffca81f70 a2=0 a3=ffff825bc6c0 items=0 ppid=2194 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.934000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:20:13.935000 audit[2236]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:13.935000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffeee4d60 a2=0 a3=ffff9fd056c0 items=0 ppid=2194 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.935000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:20:13.939000 audit[2237]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:13.939000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc65ab100 a2=0 a3=ffffa5c606c0 items=0 ppid=2194 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:13.939000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:20:14.038000 audit[2238]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.038000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffed70de00 a2=0 a3=ffffa7c106c0 items=0 ppid=2194 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.038000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:20:14.042000 audit[2240]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.042000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc416e430 a2=0 a3=ffffb3fdc6c0 items=0 ppid=2194 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.042000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:20:14.045000 audit[2243]: NETFILTER_CFG table=filter:47 family=2 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.045000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcc3e94e0 a2=0 a3=ffff8f8e36c0 items=0 ppid=2194 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.045000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:20:14.046000 audit[2244]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.046000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2a388d0 a2=0 a3=ffffb071c6c0 items=0 ppid=2194 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.046000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:20:14.048000 audit[2246]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.048000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffca46b180 a2=0 a3=ffffbad3f6c0 items=0 ppid=2194 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.048000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:20:14.049000 audit[2247]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.049000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebc0b2f0 a2=0 a3=ffffa52546c0 items=0 ppid=2194 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.049000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:20:14.051000 audit[2249]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.051000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffdbb81790 a2=0 a3=ffff845c26c0 items=0 ppid=2194 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:20:14.054000 audit[2252]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.054000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffc9c2230 a2=0 a3=ffff8c8186c0 items=0 ppid=2194 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.054000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:20:14.055000 audit[2253]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.055000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd64e650 a2=0 a3=ffffbc89a6c0 items=0 ppid=2194 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.055000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:20:14.058000 audit[2255]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.058000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc19d1290 a2=0 a3=ffff9e6646c0 items=0 ppid=2194 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.058000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:20:14.059000 audit[2256]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.059000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde19e550 a2=0 a3=ffffbf5ef6c0 items=0 ppid=2194 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:20:14.061000 audit[2258]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.061000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf4dc770 a2=0 a3=ffff913ff6c0 items=0 ppid=2194 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:14.064000 audit[2261]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.064000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeb1a3a80 a2=0 a3=ffffb95376c0 items=0 ppid=2194 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:14.067000 audit[2264]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.067000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff18dd250 a2=0 a3=ffff835736c0 items=0 ppid=2194 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:20:14.068000 audit[2265]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.068000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff1f5a360 a2=0 a3=ffff907bc6c0 items=0 ppid=2194 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:20:14.070000 audit[2267]: NETFILTER_CFG table=nat:60 family=2 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.070000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffe370500 a2=0 a3=ffffb36066c0 items=0 ppid=2194 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:14.073000 audit[2270]: NETFILTER_CFG table=nat:61 family=2 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:20:14.073000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd5e52cb0 a2=0 a3=ffffbe6b06c0 items=0 ppid=2194 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.073000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:14.079000 audit[2274]: NETFILTER_CFG table=filter:62 family=2 entries=3 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:14.079000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffcddc4950 a2=0 a3=ffff8f65c6c0 items=0 ppid=2194 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.079000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:14.122000 audit[2274]: NETFILTER_CFG table=nat:63 family=2 entries=68 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:14.122000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffcddc4950 a2=0 a3=ffff8f65c6c0 items=0 ppid=2194 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:14.155000 audit[2283]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.155000 audit[2283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffbb99de0 a2=0 a3=ffffa86de6c0 items=0 ppid=2194 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.155000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:20:14.157000 audit[2285]: NETFILTER_CFG table=filter:65 family=10 entries=2 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.157000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd0a48910 a2=0 a3=ffff9203d6c0 items=0 ppid=2194 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:20:14.160000 audit[2288]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.160000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff5e6bd50 a2=0 a3=ffffa1e236c0 items=0 ppid=2194 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:20:14.161000 audit[2289]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.161000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc5c74a0 a2=0 a3=ffffa9fd06c0 items=0 ppid=2194 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.161000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:20:14.163000 audit[2291]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.163000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc299a1a0 a2=0 a3=ffffac9bb6c0 items=0 ppid=2194 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:20:14.165000 audit[2292]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.165000 audit[2292]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc78854e0 a2=0 a3=ffffb06606c0 items=0 ppid=2194 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:20:14.167000 audit[2294]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.167000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffd0986f0 a2=0 a3=ffff848ba6c0 items=0 ppid=2194 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:20:14.170000 audit[2297]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.170000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffca1a0850 a2=0 a3=ffff9d5216c0 items=0 ppid=2194 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:20:14.171000 audit[2298]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.171000 audit[2298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffe9a4070 a2=0 a3=ffffbadd06c0 items=0 ppid=2194 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:20:14.173000 audit[2300]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.173000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7d73e40 a2=0 a3=ffff8c2d96c0 items=0 ppid=2194 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:20:14.174000 audit[2301]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.174000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffca27c7b0 a2=0 a3=ffff8f82c6c0 items=0 ppid=2194 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.174000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:20:14.176000 audit[2303]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.176000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeba7cf10 a2=0 a3=ffffbe00a6c0 items=0 ppid=2194 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.176000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:20:14.179000 audit[2306]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.179000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdf685110 a2=0 a3=ffffa8bc06c0 items=0 ppid=2194 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.179000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:20:14.183000 audit[2309]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.183000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffece954f0 a2=0 a3=ffff92de26c0 items=0 ppid=2194 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.183000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:20:14.184000 audit[2310]: NETFILTER_CFG table=nat:78 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.184000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffcd8c9970 a2=0 a3=ffffafd166c0 items=0 ppid=2194 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:20:14.186000 audit[2312]: NETFILTER_CFG table=nat:79 family=10 entries=2 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.186000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffed759ce0 a2=0 a3=ffffafdd56c0 items=0 ppid=2194 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.186000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:14.189000 audit[2315]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:20:14.189000 audit[2315]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe96e3720 a2=0 a3=ffffbb88c6c0 items=0 ppid=2194 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.189000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:20:14.193000 audit[2319]: NETFILTER_CFG table=filter:81 family=10 entries=3 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:20:14.193000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff1787520 a2=0 a3=ffffa01d76c0 items=0 ppid=2194 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.193000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:14.194000 audit[2319]: NETFILTER_CFG table=nat:82 family=10 entries=10 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:20:14.194000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffff1787520 a2=0 a3=ffffa01d76c0 items=0 ppid=2194 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.194000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:14.233724 kubelet[1904]: I0212 19:20:14.233457 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2ckk2" podStartSLOduration=-9.223372023621359e+09 pod.CreationTimestamp="2024-02-12 19:20:01 +0000 UTC" firstStartedPulling="2024-02-12 19:20:10.433207944 +0000 UTC m=+22.399288293" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:20:14.232373891 +0000 UTC m=+26.198454240" watchObservedRunningTime="2024-02-12 19:20:14.233417117 +0000 UTC m=+26.199497466" Feb 12 19:20:14.749583 kubelet[1904]: E0212 19:20:14.749544 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:15.056428 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1368740168.mount: Deactivated successfully. Feb 12 19:20:15.182818 kubelet[1904]: E0212 19:20:15.182492 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:15.750376 kubelet[1904]: E0212 19:20:15.750313 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:16.751348 kubelet[1904]: E0212 19:20:16.751313 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:17.183152 kubelet[1904]: E0212 19:20:17.182450 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:17.751666 kubelet[1904]: E0212 19:20:17.751622 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:18.124534 env[1349]: time="2024-02-12T19:20:18.124210016Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:18.130603 env[1349]: time="2024-02-12T19:20:18.130567176Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:18.134399 env[1349]: time="2024-02-12T19:20:18.134367408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:18.137890 env[1349]: time="2024-02-12T19:20:18.137835564Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:18.138526 env[1349]: time="2024-02-12T19:20:18.138498035Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:20:18.140836 env[1349]: time="2024-02-12T19:20:18.140792446Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:20:18.162770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3205494438.mount: Deactivated successfully. Feb 12 19:20:18.176725 env[1349]: time="2024-02-12T19:20:18.176677631Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c\"" Feb 12 19:20:18.177550 env[1349]: time="2024-02-12T19:20:18.177522940Z" level=info msg="StartContainer for \"3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c\"" Feb 12 19:20:18.199038 systemd[1]: run-containerd-runc-k8s.io-3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c-runc.o4sitn.mount: Deactivated successfully. Feb 12 19:20:18.202353 systemd[1]: Started cri-containerd-3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c.scope. Feb 12 19:20:18.236455 kernel: kauditd_printk_skb: 327 callbacks suppressed Feb 12 19:20:18.236587 kernel: audit: type=1400 audit(1707765618.213:631): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.213000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.213000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:18.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383863633335316630636535386661363861643235653763343537 Feb 12 19:20:18.296904 kernel: audit: type=1300 audit(1707765618.213:631): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:18.297027 kernel: audit: type=1327 audit(1707765618.213:631): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383863633335316630636535386661363861643235653763343537 Feb 12 19:20:18.297046 env[1349]: time="2024-02-12T19:20:18.280313997Z" level=info msg="StartContainer for \"3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c\" returns successfully" Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.315362 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.332346 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.350113 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.368257 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.386518 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.407047 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.426815 kernel: audit: type=1400 audit(1707765618.216:632): avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.216000 audit: BPF prog-id=76 op=LOAD Feb 12 19:20:18.216000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:18.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383863633335316630636535386661363861643235653763343537 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.219000 audit: BPF prog-id=77 op=LOAD Feb 12 19:20:18.219000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:18.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383863633335316630636535386661363861643235653763343537 Feb 12 19:20:18.236000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:20:18.236000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:18.236000 audit: BPF prog-id=78 op=LOAD Feb 12 19:20:18.236000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:18.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333383863633335316630636535386661363861643235653763343537 Feb 12 19:20:18.752621 kubelet[1904]: E0212 19:20:18.752596 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:19.182774 kubelet[1904]: E0212 19:20:19.182464 1904 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:19.551645 systemd[1]: cri-containerd-3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c.scope: Deactivated successfully. Feb 12 19:20:19.555000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:20:19.563818 kubelet[1904]: I0212 19:20:19.563789 1904 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:20:19.569681 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c-rootfs.mount: Deactivated successfully. Feb 12 19:20:19.754148 kubelet[1904]: E0212 19:20:19.754107 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:20.754296 kubelet[1904]: E0212 19:20:20.754252 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:21.154564 env[1349]: time="2024-02-12T19:20:21.154222094Z" level=info msg="shim disconnected" id=3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c Feb 12 19:20:21.154564 env[1349]: time="2024-02-12T19:20:21.154295413Z" level=warning msg="cleaning up after shim disconnected" id=3388cc351f0ce58fa68ad25e7c457e97eb5efb499d7694b354ad84afbff7ca0c namespace=k8s.io Feb 12 19:20:21.154564 env[1349]: time="2024-02-12T19:20:21.154305373Z" level=info msg="cleaning up dead shim" Feb 12 19:20:21.160895 env[1349]: time="2024-02-12T19:20:21.160840696Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:20:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2373 runtime=io.containerd.runc.v2\n" Feb 12 19:20:21.186663 systemd[1]: Created slice kubepods-besteffort-podf85f5b27_d91c_49c8_8bb3_7b22528b74f5.slice. Feb 12 19:20:21.189294 env[1349]: time="2024-02-12T19:20:21.189228722Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ft5z2,Uid:f85f5b27-d91c-49c8-8bb3-7b22528b74f5,Namespace:calico-system,Attempt:0,}" Feb 12 19:20:21.248484 env[1349]: time="2024-02-12T19:20:21.248436347Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:20:21.273187 env[1349]: time="2024-02-12T19:20:21.273110057Z" level=error msg="Failed to destroy network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:21.274443 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a-shm.mount: Deactivated successfully. Feb 12 19:20:21.275445 env[1349]: time="2024-02-12T19:20:21.275402150Z" level=error msg="encountered an error cleaning up failed sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:21.275493 env[1349]: time="2024-02-12T19:20:21.275464150Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ft5z2,Uid:f85f5b27-d91c-49c8-8bb3-7b22528b74f5,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:21.275731 kubelet[1904]: E0212 19:20:21.275698 1904 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:21.275796 kubelet[1904]: E0212 19:20:21.275761 1904 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:21.275796 kubelet[1904]: E0212 19:20:21.275782 1904 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ft5z2" Feb 12 19:20:21.275872 kubelet[1904]: E0212 19:20:21.275834 1904 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ft5z2_calico-system(f85f5b27-d91c-49c8-8bb3-7b22528b74f5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ft5z2_calico-system(f85f5b27-d91c-49c8-8bb3-7b22528b74f5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:21.754589 kubelet[1904]: E0212 19:20:21.754542 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:22.249815 kubelet[1904]: I0212 19:20:22.249787 1904 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:22.250620 env[1349]: time="2024-02-12T19:20:22.250589005Z" level=info msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" Feb 12 19:20:22.271728 env[1349]: time="2024-02-12T19:20:22.271673763Z" level=error msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" failed" error="failed to destroy network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:22.272097 kubelet[1904]: E0212 19:20:22.272073 1904 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:22.272181 kubelet[1904]: E0212 19:20:22.272132 1904 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a} Feb 12 19:20:22.272181 kubelet[1904]: E0212 19:20:22.272166 1904 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:20:22.272284 kubelet[1904]: E0212 19:20:22.272195 1904 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f85f5b27-d91c-49c8-8bb3-7b22528b74f5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ft5z2" podUID=f85f5b27-d91c-49c8-8bb3-7b22528b74f5 Feb 12 19:20:22.626811 kubelet[1904]: I0212 19:20:22.626124 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:20:22.630663 systemd[1]: Created slice kubepods-besteffort-podd8e71a2c_e4c2_4aed_af91_56333d673d2a.slice. Feb 12 19:20:22.735006 kubelet[1904]: I0212 19:20:22.734967 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5rhw9\" (UniqueName: \"kubernetes.io/projected/d8e71a2c-e4c2-4aed-af91-56333d673d2a-kube-api-access-5rhw9\") pod \"nginx-deployment-8ffc5cf85-zrfzx\" (UID: \"d8e71a2c-e4c2-4aed-af91-56333d673d2a\") " pod="default/nginx-deployment-8ffc5cf85-zrfzx" Feb 12 19:20:22.755233 kubelet[1904]: E0212 19:20:22.755208 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:22.934978 env[1349]: time="2024-02-12T19:20:22.934870087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-zrfzx,Uid:d8e71a2c-e4c2-4aed-af91-56333d673d2a,Namespace:default,Attempt:0,}" Feb 12 19:20:23.051877 env[1349]: time="2024-02-12T19:20:23.051820642Z" level=error msg="Failed to destroy network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:23.053924 env[1349]: time="2024-02-12T19:20:23.053873019Z" level=error msg="encountered an error cleaning up failed sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:23.053157 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af-shm.mount: Deactivated successfully. Feb 12 19:20:23.054087 env[1349]: time="2024-02-12T19:20:23.053928818Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-zrfzx,Uid:d8e71a2c-e4c2-4aed-af91-56333d673d2a,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:23.054338 kubelet[1904]: E0212 19:20:23.054306 1904 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:23.054401 kubelet[1904]: E0212 19:20:23.054364 1904 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-zrfzx" Feb 12 19:20:23.054401 kubelet[1904]: E0212 19:20:23.054385 1904 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-8ffc5cf85-zrfzx" Feb 12 19:20:23.054466 kubelet[1904]: E0212 19:20:23.054437 1904 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-8ffc5cf85-zrfzx_default(d8e71a2c-e4c2-4aed-af91-56333d673d2a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-8ffc5cf85-zrfzx_default(d8e71a2c-e4c2-4aed-af91-56333d673d2a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-zrfzx" podUID=d8e71a2c-e4c2-4aed-af91-56333d673d2a Feb 12 19:20:23.252365 kubelet[1904]: I0212 19:20:23.252332 1904 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:23.253148 env[1349]: time="2024-02-12T19:20:23.253107193Z" level=info msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" Feb 12 19:20:23.277816 env[1349]: time="2024-02-12T19:20:23.277750598Z" level=error msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" failed" error="failed to destroy network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:20:23.278060 kubelet[1904]: E0212 19:20:23.278033 1904 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:23.278115 kubelet[1904]: E0212 19:20:23.278077 1904 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af} Feb 12 19:20:23.278158 kubelet[1904]: E0212 19:20:23.278119 1904 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d8e71a2c-e4c2-4aed-af91-56333d673d2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:20:23.278217 kubelet[1904]: E0212 19:20:23.278167 1904 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d8e71a2c-e4c2-4aed-af91-56333d673d2a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-8ffc5cf85-zrfzx" podUID=d8e71a2c-e4c2-4aed-af91-56333d673d2a Feb 12 19:20:23.756468 kubelet[1904]: E0212 19:20:23.756427 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:24.757041 kubelet[1904]: E0212 19:20:24.756987 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:25.757587 kubelet[1904]: E0212 19:20:25.757539 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:26.757920 kubelet[1904]: E0212 19:20:26.757854 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:27.758523 kubelet[1904]: E0212 19:20:27.758416 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:27.937040 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2568618286.mount: Deactivated successfully. Feb 12 19:20:28.382238 env[1349]: time="2024-02-12T19:20:28.382190627Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:28.389538 env[1349]: time="2024-02-12T19:20:28.389500914Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:28.393183 env[1349]: time="2024-02-12T19:20:28.393151718Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:28.397073 env[1349]: time="2024-02-12T19:20:28.397044520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:28.397428 env[1349]: time="2024-02-12T19:20:28.397396196Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:20:28.409180 env[1349]: time="2024-02-12T19:20:28.409135680Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:20:28.438241 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2422615148.mount: Deactivated successfully. Feb 12 19:20:28.455287 env[1349]: time="2024-02-12T19:20:28.455218425Z" level=info msg="CreateContainer within sandbox \"b5a5f41c5cca55eea67172a28f96a093829bd695d77639df4307c8ad38c67d08\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b\"" Feb 12 19:20:28.455911 env[1349]: time="2024-02-12T19:20:28.455873738Z" level=info msg="StartContainer for \"c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b\"" Feb 12 19:20:28.470488 systemd[1]: Started cri-containerd-c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b.scope. Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.493006 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:20:28.493129 kernel: audit: type=1400 audit(1707765628.486:638): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.535738 kernel: audit: type=1300 audit(1707765628.486:638): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2044 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663733373236616430663461313830313461666264396561353861 Feb 12 19:20:28.559493 kernel: audit: type=1327 audit(1707765628.486:638): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663733373236616430663461313830313461666264396561353861 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.577196 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.587407 env[1349]: time="2024-02-12T19:20:28.587362478Z" level=info msg="StartContainer for \"c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b\" returns successfully" Feb 12 19:20:28.596193 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.596441 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.632504 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.632665 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.668459 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.668553 kernel: audit: type=1400 audit(1707765628.486:639): avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit: BPF prog-id=79 op=LOAD Feb 12 19:20:28.486000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2044 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663733373236616430663461313830313461666264396561353861 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit: BPF prog-id=80 op=LOAD Feb 12 19:20:28.486000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2044 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663733373236616430663461313830313461666264396561353861 Feb 12 19:20:28.486000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:20:28.486000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { perfmon } for pid=2497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit[2497]: AVC avc: denied { bpf } for pid=2497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:28.486000 audit: BPF prog-id=81 op=LOAD Feb 12 19:20:28.486000 audit[2497]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2044 pid=2497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337663733373236616430663461313830313461666264396561353861 Feb 12 19:20:28.733037 kubelet[1904]: E0212 19:20:28.733001 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:28.759269 kubelet[1904]: E0212 19:20:28.759229 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:28.871778 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:20:28.871902 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:20:29.277944 systemd[1]: run-containerd-runc-k8s.io-c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b-runc.jZjudd.mount: Deactivated successfully. Feb 12 19:20:29.759717 kubelet[1904]: E0212 19:20:29.759675 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:30.259000 audit[2635]: AVC avc: denied { write } for pid=2635 comm="tee" name="fd" dev="proc" ino=18700 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.260000 audit[2637]: AVC avc: denied { write } for pid=2637 comm="tee" name="fd" dev="proc" ino=17807 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.260000 audit[2637]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcacb296e a2=241 a3=1b6 items=1 ppid=2599 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.260000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:20:30.260000 audit: PATH item=0 name="/dev/fd/63" inode=17802 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.260000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.259000 audit[2635]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeecba97d a2=241 a3=1b6 items=1 ppid=2593 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.259000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:20:30.259000 audit: PATH item=0 name="/dev/fd/63" inode=18690 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.259000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.266000 audit[2641]: AVC avc: denied { write } for pid=2641 comm="tee" name="fd" dev="proc" ino=17811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.266000 audit[2641]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc42db97d a2=241 a3=1b6 items=1 ppid=2589 pid=2641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.266000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:20:30.266000 audit: PATH item=0 name="/dev/fd/63" inode=17803 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.266000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.267000 audit[2643]: AVC avc: denied { write } for pid=2643 comm="tee" name="fd" dev="proc" ino=17815 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.267000 audit[2643]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff51b997f a2=241 a3=1b6 items=1 ppid=2590 pid=2643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.267000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:20:30.267000 audit: PATH item=0 name="/dev/fd/63" inode=18696 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.267000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.268000 audit[2639]: AVC avc: denied { write } for pid=2639 comm="tee" name="fd" dev="proc" ino=17819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.268000 audit[2639]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdce8b96d a2=241 a3=1b6 items=1 ppid=2595 pid=2639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.268000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:20:30.268000 audit: PATH item=0 name="/dev/fd/63" inode=18693 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.268000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.275000 audit[2645]: AVC avc: denied { write } for pid=2645 comm="tee" name="fd" dev="proc" ino=18738 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.280894 systemd[1]: run-containerd-runc-k8s.io-c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b-runc.noS5Qx.mount: Deactivated successfully. Feb 12 19:20:30.281000 audit[2647]: AVC avc: denied { write } for pid=2647 comm="tee" name="fd" dev="proc" ino=18741 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:20:30.275000 audit[2645]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe715297e a2=241 a3=1b6 items=1 ppid=2586 pid=2645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.275000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:20:30.275000 audit: PATH item=0 name="/dev/fd/63" inode=17804 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.275000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.281000 audit[2647]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc401e97d a2=241 a3=1b6 items=1 ppid=2596 pid=2647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.281000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:20:30.281000 audit: PATH item=0 name="/dev/fd/63" inode=18697 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:20:30.281000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:20:30.537282 kernel: Initializing XFRM netlink socket Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit: BPF prog-id=82 op=LOAD Feb 12 19:20:30.659000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe825c238 a2=70 a3=0 items=0 ppid=2592 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.659000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:30.659000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit: BPF prog-id=83 op=LOAD Feb 12 19:20:30.659000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe825c238 a2=70 a3=4a174c items=0 ppid=2592 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.659000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:30.659000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:20:30.659000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.659000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe825c268 a2=70 a3=201a979f items=0 ppid=2592 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.659000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { perfmon } for pid=2745 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit[2745]: AVC avc: denied { bpf } for pid=2745 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.660000 audit: BPF prog-id=84 op=LOAD Feb 12 19:20:30.660000 audit[2745]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe825c1b8 a2=70 a3=201a97b9 items=0 ppid=2592 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.660000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:20:30.664000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.664000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc94bdaa8 a2=70 a3=0 items=0 ppid=2592 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.664000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:20:30.664000 audit[2749]: AVC avc: denied { bpf } for pid=2749 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:30.664000 audit[2749]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffc94bd988 a2=70 a3=2 items=0 ppid=2592 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.664000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:20:30.677000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:20:30.760213 kubelet[1904]: E0212 19:20:30.760177 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:30.799000 audit[2774]: NETFILTER_CFG table=mangle:83 family=2 entries=19 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:30.799000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd5cb47f0 a2=0 a3=ffff850fcfa8 items=0 ppid=2592 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.799000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:30.831000 audit[2773]: NETFILTER_CFG table=raw:84 family=2 entries=19 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:30.831000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffe455db00 a2=0 a3=ffff9f11efa8 items=0 ppid=2592 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.831000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:30.847000 audit[2776]: NETFILTER_CFG table=filter:85 family=2 entries=39 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:30.847000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffe32e14e0 a2=0 a3=ffff99254fa8 items=0 ppid=2592 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.847000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:30.847000 audit[2775]: NETFILTER_CFG table=nat:86 family=2 entries=16 op=nft_register_chain pid=2775 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:30.847000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffdda85e70 a2=0 a3=ffffaad4efa8 items=0 ppid=2592 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:30.847000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:31.561730 systemd-networkd[1502]: vxlan.calico: Link UP Feb 12 19:20:31.561738 systemd-networkd[1502]: vxlan.calico: Gained carrier Feb 12 19:20:31.760716 kubelet[1904]: E0212 19:20:31.760635 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:32.761826 kubelet[1904]: E0212 19:20:32.761795 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:33.182850 env[1349]: time="2024-02-12T19:20:33.181834305Z" level=info msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" Feb 12 19:20:33.227468 kubelet[1904]: I0212 19:20:33.227427 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-cpxhz" podStartSLOduration=-9.223372004627388e+09 pod.CreationTimestamp="2024-02-12 19:20:01 +0000 UTC" firstStartedPulling="2024-02-12 19:20:10.341530418 +0000 UTC m=+22.307610767" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:20:29.285067641 +0000 UTC m=+41.251147990" watchObservedRunningTime="2024-02-12 19:20:33.227387625 +0000 UTC m=+45.193467974" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.226 [INFO][2804] k8s.go 578: Cleaning up netns ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.226 [INFO][2804] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" iface="eth0" netns="/var/run/netns/cni-79dd6d79-015b-9019-2c85-1cc38bf994c4" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.227 [INFO][2804] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" iface="eth0" netns="/var/run/netns/cni-79dd6d79-015b-9019-2c85-1cc38bf994c4" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.227 [INFO][2804] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" iface="eth0" netns="/var/run/netns/cni-79dd6d79-015b-9019-2c85-1cc38bf994c4" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.227 [INFO][2804] k8s.go 585: Releasing IP address(es) ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.227 [INFO][2804] utils.go 188: Calico CNI releasing IP address ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.244 [INFO][2811] ipam_plugin.go 415: Releasing address using handleID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.244 [INFO][2811] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.244 [INFO][2811] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.256 [WARNING][2811] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.256 [INFO][2811] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.257 [INFO][2811] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:33.259356 env[1349]: 2024-02-12 19:20:33.258 [INFO][2804] k8s.go 591: Teardown processing complete. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:33.260921 systemd[1]: run-netns-cni\x2d79dd6d79\x2d015b\x2d9019\x2d2c85\x2d1cc38bf994c4.mount: Deactivated successfully. Feb 12 19:20:33.263158 env[1349]: time="2024-02-12T19:20:33.261787522Z" level=info msg="TearDown network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" successfully" Feb 12 19:20:33.263158 env[1349]: time="2024-02-12T19:20:33.261831882Z" level=info msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" returns successfully" Feb 12 19:20:33.263158 env[1349]: time="2024-02-12T19:20:33.262548076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ft5z2,Uid:f85f5b27-d91c-49c8-8bb3-7b22528b74f5,Namespace:calico-system,Attempt:1,}" Feb 12 19:20:33.326492 systemd-networkd[1502]: vxlan.calico: Gained IPv6LL Feb 12 19:20:33.762119 kubelet[1904]: E0212 19:20:33.762076 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:34.220627 env[1349]: time="2024-02-12T19:20:34.182399905Z" level=info msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.218 [INFO][2830] k8s.go 578: Cleaning up netns ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.220 [INFO][2830] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" iface="eth0" netns="/var/run/netns/cni-81cf3126-07c9-94f6-aa8f-00c96877fdc2" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.221 [INFO][2830] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" iface="eth0" netns="/var/run/netns/cni-81cf3126-07c9-94f6-aa8f-00c96877fdc2" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.221 [INFO][2830] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" iface="eth0" netns="/var/run/netns/cni-81cf3126-07c9-94f6-aa8f-00c96877fdc2" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.221 [INFO][2830] k8s.go 585: Releasing IP address(es) ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.221 [INFO][2830] utils.go 188: Calico CNI releasing IP address ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.242 [INFO][2836] ipam_plugin.go 415: Releasing address using handleID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.242 [INFO][2836] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.242 [INFO][2836] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.252 [WARNING][2836] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.252 [INFO][2836] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.253 [INFO][2836] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:34.255782 env[1349]: 2024-02-12 19:20:34.254 [INFO][2830] k8s.go 591: Teardown processing complete. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:34.257946 env[1349]: time="2024-02-12T19:20:34.257905656Z" level=info msg="TearDown network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" successfully" Feb 12 19:20:34.258054 env[1349]: time="2024-02-12T19:20:34.258036415Z" level=info msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" returns successfully" Feb 12 19:20:34.258851 env[1349]: time="2024-02-12T19:20:34.258823328Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-zrfzx,Uid:d8e71a2c-e4c2-4aed-af91-56333d673d2a,Namespace:default,Attempt:1,}" Feb 12 19:20:34.259075 systemd[1]: run-netns-cni\x2d81cf3126\x2d07c9\x2d94f6\x2daa8f\x2d00c96877fdc2.mount: Deactivated successfully. Feb 12 19:20:34.485616 systemd-networkd[1502]: cali6b556d6bbbd: Link UP Feb 12 19:20:34.497805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:20:34.497897 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b556d6bbbd: link becomes ready Feb 12 19:20:34.501369 systemd-networkd[1502]: cali6b556d6bbbd: Gained carrier Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.406 [INFO][2848] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-csi--node--driver--ft5z2-eth0 csi-node-driver- calico-system f85f5b27-d91c-49c8-8bb3-7b22528b74f5 1205 0 2024-02-12 19:20:01 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 csi-node-driver-ft5z2 eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali6b556d6bbbd [] []}} ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.406 [INFO][2848] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.440 [INFO][2867] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" HandleID="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.455 [INFO][2867] ipam_plugin.go 268: Auto assigning IP ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" HandleID="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027adc0), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.12", "pod":"csi-node-driver-ft5z2", "timestamp":"2024-02-12 19:20:34.440676166 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.455 [INFO][2867] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.456 [INFO][2867] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.456 [INFO][2867] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.457 [INFO][2867] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.461 [INFO][2867] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.465 [INFO][2867] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.466 [INFO][2867] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.468 [INFO][2867] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.468 [INFO][2867] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.469 [INFO][2867] ipam.go 1682: Creating new handle: k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03 Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.472 [INFO][2867] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.476 [INFO][2867] ipam.go 1216: Successfully claimed IPs: [192.168.119.1/26] block=192.168.119.0/26 handle="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.477 [INFO][2867] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.1/26] handle="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" host="10.200.20.12" Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.477 [INFO][2867] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:34.514801 env[1349]: 2024-02-12 19:20:34.477 [INFO][2867] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.1/26] IPv6=[] ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" HandleID="k8s-pod-network.c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.478 [INFO][2848] k8s.go 385: Populated endpoint ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--ft5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f85f5b27-d91c-49c8-8bb3-7b22528b74f5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"csi-node-driver-ft5z2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6b556d6bbbd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.479 [INFO][2848] k8s.go 386: Calico CNI using IPs: [192.168.119.1/32] ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.479 [INFO][2848] dataplane_linux.go 68: Setting the host side veth name to cali6b556d6bbbd ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.504 [INFO][2848] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.505 [INFO][2848] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--ft5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f85f5b27-d91c-49c8-8bb3-7b22528b74f5", ResourceVersion:"1205", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03", Pod:"csi-node-driver-ft5z2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6b556d6bbbd", MAC:"36:88:b8:00:fb:46", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:34.516615 env[1349]: 2024-02-12 19:20:34.513 [INFO][2848] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03" Namespace="calico-system" Pod="csi-node-driver-ft5z2" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:34.533000 audit[2894]: NETFILTER_CFG table=filter:87 family=2 entries=36 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:34.540811 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 12 19:20:34.540869 kernel: audit: type=1325 audit(1707765634.533:664): table=filter:87 family=2 entries=36 op=nft_register_chain pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:34.555372 env[1349]: time="2024-02-12T19:20:34.538697043Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:34.555372 env[1349]: time="2024-02-12T19:20:34.538730723Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:34.555372 env[1349]: time="2024-02-12T19:20:34.538740523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:34.555372 env[1349]: time="2024-02-12T19:20:34.538841602Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03 pid=2901 runtime=io.containerd.runc.v2 Feb 12 19:20:34.533000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffd0909560 a2=0 a3=ffff975cbfa8 items=0 ppid=2592 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.584581 kernel: audit: type=1300 audit(1707765634.533:664): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffd0909560 a2=0 a3=ffff975cbfa8 items=0 ppid=2592 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.533000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:34.591948 systemd[1]: Started cri-containerd-c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03.scope. Feb 12 19:20:34.605238 kernel: audit: type=1327 audit(1707765634.533:664): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.637268 kernel: audit: type=1400 audit(1707765634.615:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.640118 systemd-networkd[1502]: cali148ee561be7: Link UP Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.681402 kernel: audit: type=1400 audit(1707765634.615:666): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.681501 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali148ee561be7: link becomes ready Feb 12 19:20:34.681525 kernel: audit: type=1400 audit(1707765634.615:667): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.702590 kernel: audit: type=1400 audit(1707765634.615:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.682411 systemd-networkd[1502]: cali148ee561be7: Gained carrier Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.724830 kernel: audit: type=1400 audit(1707765634.615:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.420 [INFO][2855] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0 nginx-deployment-8ffc5cf85- default d8e71a2c-e4c2-4aed-af91-56333d673d2a 1208 0 2024-02-12 19:20:22 +0000 UTC map[app:nginx pod-template-hash:8ffc5cf85 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 nginx-deployment-8ffc5cf85-zrfzx eth0 default [] [] [kns.default ksa.default.default] cali148ee561be7 [] []}} ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.420 [INFO][2855] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.451 [INFO][2872] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" HandleID="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.464 [INFO][2872] ipam_plugin.go 268: Auto assigning IP ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" HandleID="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d5a80), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nginx-deployment-8ffc5cf85-zrfzx", "timestamp":"2024-02-12 19:20:34.451689231 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.464 [INFO][2872] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.477 [INFO][2872] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.477 [INFO][2872] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.479 [INFO][2872] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.500 [INFO][2872] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.511 [INFO][2872] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.517 [INFO][2872] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.556 [INFO][2872] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.556 [INFO][2872] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.584 [INFO][2872] ipam.go 1682: Creating new handle: k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80 Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.606 [INFO][2872] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.615 [INFO][2872] ipam.go 1216: Successfully claimed IPs: [192.168.119.2/26] block=192.168.119.0/26 handle="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.615 [INFO][2872] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.2/26] handle="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" host="10.200.20.12" Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.615 [INFO][2872] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:34.727898 env[1349]: 2024-02-12 19:20:34.615 [INFO][2872] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.2/26] IPv6=[] ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" HandleID="k8s-pod-network.19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.637 [INFO][2855] k8s.go 385: Populated endpoint ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d8e71a2c-e4c2-4aed-af91-56333d673d2a", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nginx-deployment-8ffc5cf85-zrfzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali148ee561be7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.637 [INFO][2855] k8s.go 386: Calico CNI using IPs: [192.168.119.2/32] ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.638 [INFO][2855] dataplane_linux.go 68: Setting the host side veth name to cali148ee561be7 ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.684 [INFO][2855] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.684 [INFO][2855] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d8e71a2c-e4c2-4aed-af91-56333d673d2a", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80", Pod:"nginx-deployment-8ffc5cf85-zrfzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali148ee561be7", MAC:"e2:c1:a7:d4:38:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:34.731077 env[1349]: 2024-02-12 19:20:34.710 [INFO][2855] k8s.go 491: Wrote updated endpoint to datastore ContainerID="19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80" Namespace="default" Pod="nginx-deployment-8ffc5cf85-zrfzx" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.753795 kernel: audit: type=1400 audit(1707765634.615:670): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.762349 kubelet[1904]: E0212 19:20:34.762286 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:34.775730 kernel: audit: type=1400 audit(1707765634.615:671): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.615000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.634000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.634000 audit: BPF prog-id=85 op=LOAD Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2901 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334366561383631316666666165333734663530313234303335623764 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2901 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334366561383631316666666165333734663530313234303335623764 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.660000 audit: BPF prog-id=86 op=LOAD Feb 12 19:20:34.660000 audit[2911]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2901 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334366561383631316666666165333734663530313234303335623764 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.680000 audit: BPF prog-id=87 op=LOAD Feb 12 19:20:34.680000 audit[2911]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2901 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334366561383631316666666165333734663530313234303335623764 Feb 12 19:20:34.704000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:20:34.704000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { perfmon } for pid=2911 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit[2911]: AVC avc: denied { bpf } for pid=2911 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.704000 audit: BPF prog-id=88 op=LOAD Feb 12 19:20:34.704000 audit[2911]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2901 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.704000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334366561383631316666666165333734663530313234303335623764 Feb 12 19:20:34.740000 audit[2946]: NETFILTER_CFG table=filter:88 family=2 entries=40 op=nft_register_chain pid=2946 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:34.740000 audit[2946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21064 a0=3 a1=fffff0ed9ab0 a2=0 a3=ffffab0ddfa8 items=0 ppid=2592 pid=2946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.740000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:34.779084 env[1349]: time="2024-02-12T19:20:34.779039618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ft5z2,Uid:f85f5b27-d91c-49c8-8bb3-7b22528b74f5,Namespace:calico-system,Attempt:1,} returns sandbox id \"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03\"" Feb 12 19:20:34.780563 env[1349]: time="2024-02-12T19:20:34.780455646Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:34.780563 env[1349]: time="2024-02-12T19:20:34.780490446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:34.780563 env[1349]: time="2024-02-12T19:20:34.780500286Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:34.780926 env[1349]: time="2024-02-12T19:20:34.780620845Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80 pid=2954 runtime=io.containerd.runc.v2 Feb 12 19:20:34.782630 env[1349]: time="2024-02-12T19:20:34.782598308Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:20:34.791505 systemd[1]: Started cri-containerd-19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80.scope. Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.803000 audit: BPF prog-id=89 op=LOAD Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2954 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623461643531363265323839313064306562623534666232373137 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2954 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623461643531363265323839313064306562623534666232373137 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit: BPF prog-id=90 op=LOAD Feb 12 19:20:34.804000 audit[2968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2954 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623461643531363265323839313064306562623534666232373137 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit: BPF prog-id=91 op=LOAD Feb 12 19:20:34.804000 audit[2968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2954 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623461643531363265323839313064306562623534666232373137 Feb 12 19:20:34.804000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:20:34.804000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { perfmon } for pid=2968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit[2968]: AVC avc: denied { bpf } for pid=2968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:34.804000 audit: BPF prog-id=92 op=LOAD Feb 12 19:20:34.804000 audit[2968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2954 pid=2968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139623461643531363265323839313064306562623534666232373137 Feb 12 19:20:34.823850 env[1349]: time="2024-02-12T19:20:34.823808194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-8ffc5cf85-zrfzx,Uid:d8e71a2c-e4c2-4aed-af91-56333d673d2a,Namespace:default,Attempt:1,} returns sandbox id \"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80\"" Feb 12 19:20:35.758442 systemd-networkd[1502]: cali6b556d6bbbd: Gained IPv6LL Feb 12 19:20:35.763166 kubelet[1904]: E0212 19:20:35.763126 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:36.334397 systemd-networkd[1502]: cali148ee561be7: Gained IPv6LL Feb 12 19:20:36.721497 env[1349]: time="2024-02-12T19:20:36.721458114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:36.730660 env[1349]: time="2024-02-12T19:20:36.730623559Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:36.734114 env[1349]: time="2024-02-12T19:20:36.734084530Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:36.740406 env[1349]: time="2024-02-12T19:20:36.740369479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:36.741063 env[1349]: time="2024-02-12T19:20:36.741037713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:20:36.742521 env[1349]: time="2024-02-12T19:20:36.742493621Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:20:36.743292 env[1349]: time="2024-02-12T19:20:36.743265295Z" level=info msg="CreateContainer within sandbox \"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:20:36.764068 kubelet[1904]: E0212 19:20:36.764018 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:36.772857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount692495444.mount: Deactivated successfully. Feb 12 19:20:36.787545 env[1349]: time="2024-02-12T19:20:36.787486772Z" level=info msg="CreateContainer within sandbox \"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4d73837e8530cbcbce45cae65944640f184e1c91b0959e2f3b593db4fedc445a\"" Feb 12 19:20:36.788360 env[1349]: time="2024-02-12T19:20:36.788333845Z" level=info msg="StartContainer for \"4d73837e8530cbcbce45cae65944640f184e1c91b0959e2f3b593db4fedc445a\"" Feb 12 19:20:36.810035 systemd[1]: Started cri-containerd-4d73837e8530cbcbce45cae65944640f184e1c91b0959e2f3b593db4fedc445a.scope. Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2901 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:36.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373338333765383533306362636263653435636165363539343436 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.826000 audit: BPF prog-id=93 op=LOAD Feb 12 19:20:36.826000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2901 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:36.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373338333765383533306362636263653435636165363539343436 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit: BPF prog-id=94 op=LOAD Feb 12 19:20:36.827000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2901 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:36.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373338333765383533306362636263653435636165363539343436 Feb 12 19:20:36.827000 audit: BPF prog-id=94 op=UNLOAD Feb 12 19:20:36.827000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { perfmon } for pid=3005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit[3005]: AVC avc: denied { bpf } for pid=3005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:36.827000 audit: BPF prog-id=95 op=LOAD Feb 12 19:20:36.827000 audit[3005]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2901 pid=3005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:36.827000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464373338333765383533306362636263653435636165363539343436 Feb 12 19:20:36.847879 env[1349]: time="2024-02-12T19:20:36.847833196Z" level=info msg="StartContainer for \"4d73837e8530cbcbce45cae65944640f184e1c91b0959e2f3b593db4fedc445a\" returns successfully" Feb 12 19:20:37.764914 kubelet[1904]: E0212 19:20:37.764863 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:38.765273 kubelet[1904]: E0212 19:20:38.765214 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:39.393351 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1510761348.mount: Deactivated successfully. Feb 12 19:20:39.766071 kubelet[1904]: E0212 19:20:39.766039 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:40.284282 env[1349]: time="2024-02-12T19:20:40.284215754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:40.292323 env[1349]: time="2024-02-12T19:20:40.292280214Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:40.298217 env[1349]: time="2024-02-12T19:20:40.298179009Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:40.305524 env[1349]: time="2024-02-12T19:20:40.305484834Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:40.305834 env[1349]: time="2024-02-12T19:20:40.305806352Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:20:40.307601 env[1349]: time="2024-02-12T19:20:40.307565699Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:20:40.308315 env[1349]: time="2024-02-12T19:20:40.308277933Z" level=info msg="CreateContainer within sandbox \"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:20:40.341699 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3943747804.mount: Deactivated successfully. Feb 12 19:20:40.346896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount760582625.mount: Deactivated successfully. Feb 12 19:20:40.364083 env[1349]: time="2024-02-12T19:20:40.364039674Z" level=info msg="CreateContainer within sandbox \"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"ac607764d11368638a6e094c9065c1e1b4eb380e5448726bc02ef4da57c91453\"" Feb 12 19:20:40.365098 env[1349]: time="2024-02-12T19:20:40.365072026Z" level=info msg="StartContainer for \"ac607764d11368638a6e094c9065c1e1b4eb380e5448726bc02ef4da57c91453\"" Feb 12 19:20:40.382863 systemd[1]: Started cri-containerd-ac607764d11368638a6e094c9065c1e1b4eb380e5448726bc02ef4da57c91453.scope. Feb 12 19:20:40.399040 kernel: kauditd_printk_skb: 153 callbacks suppressed Feb 12 19:20:40.399153 kernel: audit: type=1400 audit(1707765640.392:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.433593 kernel: audit: type=1400 audit(1707765640.392:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.453352 kernel: audit: type=1400 audit(1707765640.392:710): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.488814 kernel: audit: type=1400 audit(1707765640.392:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.488909 kernel: audit: type=1400 audit(1707765640.392:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.527120 kernel: audit: type=1400 audit(1707765640.392:713): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.527237 kernel: audit: type=1400 audit(1707765640.392:714): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.527292 env[1349]: time="2024-02-12T19:20:40.514279224Z" level=info msg="StartContainer for \"ac607764d11368638a6e094c9065c1e1b4eb380e5448726bc02ef4da57c91453\" returns successfully" Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.545422 kernel: audit: type=1400 audit(1707765640.392:715): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.546396 kernel: audit: type=1400 audit(1707765640.392:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.564342 kernel: audit: type=1400 audit(1707765640.397:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.397000 audit: BPF prog-id=96 op=LOAD Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2954 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363037373634643131333638363338613665303934633930363563 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2954 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363037373634643131333638363338613665303934633930363563 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.398000 audit: BPF prog-id=97 op=LOAD Feb 12 19:20:40.398000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2954 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363037373634643131333638363338613665303934633930363563 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.415000 audit: BPF prog-id=98 op=LOAD Feb 12 19:20:40.415000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2954 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363037373634643131333638363338613665303934633930363563 Feb 12 19:20:40.432000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:20:40.432000 audit: BPF prog-id=97 op=UNLOAD Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { perfmon } for pid=3042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit[3042]: AVC avc: denied { bpf } for pid=3042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:40.432000 audit: BPF prog-id=99 op=LOAD Feb 12 19:20:40.432000 audit[3042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2954 pid=3042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.432000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363037373634643131333638363338613665303934633930363563 Feb 12 19:20:40.767322 kubelet[1904]: E0212 19:20:40.767269 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:41.294780 kubelet[1904]: I0212 19:20:41.294741 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-8ffc5cf85-zrfzx" podStartSLOduration=-9.22337201756007e+09 pod.CreationTimestamp="2024-02-12 19:20:22 +0000 UTC" firstStartedPulling="2024-02-12 19:20:34.825142342 +0000 UTC m=+46.791222691" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:20:41.294630441 +0000 UTC m=+53.260710790" watchObservedRunningTime="2024-02-12 19:20:41.29470628 +0000 UTC m=+53.260786629" Feb 12 19:20:41.767506 kubelet[1904]: E0212 19:20:41.767472 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:42.202747 env[1349]: time="2024-02-12T19:20:42.202699906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:42.210397 env[1349]: time="2024-02-12T19:20:42.210351731Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:42.215639 env[1349]: time="2024-02-12T19:20:42.215601733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:42.221415 env[1349]: time="2024-02-12T19:20:42.221373651Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:42.221739 env[1349]: time="2024-02-12T19:20:42.221709729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:20:42.224112 env[1349]: time="2024-02-12T19:20:42.224080432Z" level=info msg="CreateContainer within sandbox \"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:20:42.254394 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3801030053.mount: Deactivated successfully. Feb 12 19:20:42.274426 env[1349]: time="2024-02-12T19:20:42.274377109Z" level=info msg="CreateContainer within sandbox \"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ff32c16a69b8fb6f3422b117998ce98debba5b35402399fe1a9c53dc00e83428\"" Feb 12 19:20:42.275115 env[1349]: time="2024-02-12T19:20:42.275039105Z" level=info msg="StartContainer for \"ff32c16a69b8fb6f3422b117998ce98debba5b35402399fe1a9c53dc00e83428\"" Feb 12 19:20:42.296201 systemd[1]: Started cri-containerd-ff32c16a69b8fb6f3422b117998ce98debba5b35402399fe1a9c53dc00e83428.scope. Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2901 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666333263313661363962386662366633343232623131373939386365 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit: BPF prog-id=100 op=LOAD Feb 12 19:20:42.313000 audit[3105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2901 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666333263313661363962386662366633343232623131373939386365 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.313000 audit: BPF prog-id=101 op=LOAD Feb 12 19:20:42.313000 audit[3105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2901 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666333263313661363962386662366633343232623131373939386365 Feb 12 19:20:42.314000 audit: BPF prog-id=101 op=UNLOAD Feb 12 19:20:42.314000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { perfmon } for pid=3105 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit[3105]: AVC avc: denied { bpf } for pid=3105 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:42.314000 audit: BPF prog-id=102 op=LOAD Feb 12 19:20:42.314000 audit[3105]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2901 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666333263313661363962386662366633343232623131373939386365 Feb 12 19:20:42.334902 env[1349]: time="2024-02-12T19:20:42.334860033Z" level=info msg="StartContainer for \"ff32c16a69b8fb6f3422b117998ce98debba5b35402399fe1a9c53dc00e83428\" returns successfully" Feb 12 19:20:42.338274 systemd[1]: run-containerd-runc-k8s.io-ff32c16a69b8fb6f3422b117998ce98debba5b35402399fe1a9c53dc00e83428-runc.ZAUQSY.mount: Deactivated successfully. Feb 12 19:20:42.768215 kubelet[1904]: E0212 19:20:42.768157 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:42.829582 kubelet[1904]: I0212 19:20:42.829549 1904 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:20:42.829582 kubelet[1904]: I0212 19:20:42.829579 1904 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:20:43.303808 kubelet[1904]: I0212 19:20:43.303769 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-ft5z2" podStartSLOduration=-9.223371994551043e+09 pod.CreationTimestamp="2024-02-12 19:20:01 +0000 UTC" firstStartedPulling="2024-02-12 19:20:34.781989633 +0000 UTC m=+46.748069942" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:20:43.303615856 +0000 UTC m=+55.269696205" watchObservedRunningTime="2024-02-12 19:20:43.303733535 +0000 UTC m=+55.269813884" Feb 12 19:20:43.769125 kubelet[1904]: E0212 19:20:43.769079 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:44.770192 kubelet[1904]: E0212 19:20:44.770153 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:45.770433 kubelet[1904]: E0212 19:20:45.770381 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:46.770580 kubelet[1904]: E0212 19:20:46.770532 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:47.770958 kubelet[1904]: E0212 19:20:47.770911 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:48.733606 kubelet[1904]: E0212 19:20:48.733571 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:48.740931 env[1349]: time="2024-02-12T19:20:48.740888106Z" level=info msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" Feb 12 19:20:48.771650 kubelet[1904]: E0212 19:20:48.771617 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.777 [WARNING][3151] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--ft5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f85f5b27-d91c-49c8-8bb3-7b22528b74f5", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03", Pod:"csi-node-driver-ft5z2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6b556d6bbbd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.777 [INFO][3151] k8s.go 578: Cleaning up netns ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.777 [INFO][3151] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" iface="eth0" netns="" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.777 [INFO][3151] k8s.go 585: Releasing IP address(es) ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.777 [INFO][3151] utils.go 188: Calico CNI releasing IP address ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.794 [INFO][3157] ipam_plugin.go 415: Releasing address using handleID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.794 [INFO][3157] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.794 [INFO][3157] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.809 [WARNING][3157] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.809 [INFO][3157] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.810 [INFO][3157] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:48.812834 env[1349]: 2024-02-12 19:20:48.811 [INFO][3151] k8s.go 591: Teardown processing complete. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.813350 env[1349]: time="2024-02-12T19:20:48.812858167Z" level=info msg="TearDown network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" successfully" Feb 12 19:20:48.813350 env[1349]: time="2024-02-12T19:20:48.812885447Z" level=info msg="StopPodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" returns successfully" Feb 12 19:20:48.813597 env[1349]: time="2024-02-12T19:20:48.813572883Z" level=info msg="RemovePodSandbox for \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" Feb 12 19:20:48.813716 env[1349]: time="2024-02-12T19:20:48.813677642Z" level=info msg="Forcibly stopping sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\"" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.847 [WARNING][3175] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--ft5z2-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f85f5b27-d91c-49c8-8bb3-7b22528b74f5", ResourceVersion:"1251", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 1, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"c46ea8611fffae374f50124035b7d48024521e4cdc89122f4ca3cbac7db3aa03", Pod:"csi-node-driver-ft5z2", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali6b556d6bbbd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.847 [INFO][3175] k8s.go 578: Cleaning up netns ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.847 [INFO][3175] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" iface="eth0" netns="" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.847 [INFO][3175] k8s.go 585: Releasing IP address(es) ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.847 [INFO][3175] utils.go 188: Calico CNI releasing IP address ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.864 [INFO][3181] ipam_plugin.go 415: Releasing address using handleID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.864 [INFO][3181] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.864 [INFO][3181] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.878 [WARNING][3181] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.878 [INFO][3181] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" HandleID="k8s-pod-network.acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Workload="10.200.20.12-k8s-csi--node--driver--ft5z2-eth0" Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.880 [INFO][3181] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:48.882088 env[1349]: 2024-02-12 19:20:48.881 [INFO][3175] k8s.go 591: Teardown processing complete. ContainerID="acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a" Feb 12 19:20:48.882533 env[1349]: time="2024-02-12T19:20:48.882132286Z" level=info msg="TearDown network for sandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" successfully" Feb 12 19:20:48.891056 env[1349]: time="2024-02-12T19:20:48.890997269Z" level=info msg="RemovePodSandbox \"acc85bce314df0ab3689d529efcf98147cddab0a18b8a44925588aae8c8d1e8a\" returns successfully" Feb 12 19:20:48.891644 env[1349]: time="2024-02-12T19:20:48.891615185Z" level=info msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.924 [WARNING][3199] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d8e71a2c-e4c2-4aed-af91-56333d673d2a", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80", Pod:"nginx-deployment-8ffc5cf85-zrfzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali148ee561be7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.925 [INFO][3199] k8s.go 578: Cleaning up netns ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.925 [INFO][3199] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" iface="eth0" netns="" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.925 [INFO][3199] k8s.go 585: Releasing IP address(es) ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.925 [INFO][3199] utils.go 188: Calico CNI releasing IP address ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.942 [INFO][3205] ipam_plugin.go 415: Releasing address using handleID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.942 [INFO][3205] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.942 [INFO][3205] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.952 [WARNING][3205] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.952 [INFO][3205] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.954 [INFO][3205] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:48.956448 env[1349]: 2024-02-12 19:20:48.955 [INFO][3199] k8s.go 591: Teardown processing complete. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:48.957091 env[1349]: time="2024-02-12T19:20:48.956443332Z" level=info msg="TearDown network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" successfully" Feb 12 19:20:48.957091 env[1349]: time="2024-02-12T19:20:48.956479971Z" level=info msg="StopPodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" returns successfully" Feb 12 19:20:48.957091 env[1349]: time="2024-02-12T19:20:48.956925009Z" level=info msg="RemovePodSandbox for \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" Feb 12 19:20:48.957091 env[1349]: time="2024-02-12T19:20:48.956953168Z" level=info msg="Forcibly stopping sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\"" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:48.994 [WARNING][3223] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0", GenerateName:"nginx-deployment-8ffc5cf85-", Namespace:"default", SelfLink:"", UID:"d8e71a2c-e4c2-4aed-af91-56333d673d2a", ResourceVersion:"1238", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"8ffc5cf85", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"19b4ad5162e28910d0ebb54fb2717f3c6a7c646f4f88b444c08a0bdf8afe2d80", Pod:"nginx-deployment-8ffc5cf85-zrfzx", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali148ee561be7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:48.994 [INFO][3223] k8s.go 578: Cleaning up netns ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:48.994 [INFO][3223] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" iface="eth0" netns="" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:48.994 [INFO][3223] k8s.go 585: Releasing IP address(es) ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:48.994 [INFO][3223] utils.go 188: Calico CNI releasing IP address ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.011 [INFO][3230] ipam_plugin.go 415: Releasing address using handleID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.011 [INFO][3230] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.011 [INFO][3230] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.020 [WARNING][3230] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.020 [INFO][3230] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" HandleID="k8s-pod-network.dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Workload="10.200.20.12-k8s-nginx--deployment--8ffc5cf85--zrfzx-eth0" Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.022 [INFO][3230] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:49.024145 env[1349]: 2024-02-12 19:20:49.023 [INFO][3223] k8s.go 591: Teardown processing complete. ContainerID="dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af" Feb 12 19:20:49.024690 env[1349]: time="2024-02-12T19:20:49.024657340Z" level=info msg="TearDown network for sandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" successfully" Feb 12 19:20:49.034578 env[1349]: time="2024-02-12T19:20:49.034536478Z" level=info msg="RemovePodSandbox \"dbc04453bbdd9ea5fc194f817363e1c07e9eeb963778fd31c4aa03637f21c9af\" returns successfully" Feb 12 19:20:49.664000 audit[3263]: NETFILTER_CFG table=filter:89 family=2 entries=18 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.671268 kernel: kauditd_printk_skb: 90 callbacks suppressed Feb 12 19:20:49.671344 kernel: audit: type=1325 audit(1707765649.664:732): table=filter:89 family=2 entries=18 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.681111 kubelet[1904]: I0212 19:20:49.681077 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:20:49.664000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffdec71cd0 a2=0 a3=ffffa331f6c0 items=0 ppid=2194 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.685613 systemd[1]: Created slice kubepods-besteffort-pod49f583ae_5ce0_4dd9_b6c5_62a123f0aaf7.slice. Feb 12 19:20:49.715634 kernel: audit: type=1300 audit(1707765649.664:732): arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffdec71cd0 a2=0 a3=ffffa331f6c0 items=0 ppid=2194 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.729898 kernel: audit: type=1327 audit(1707765649.664:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.716000 audit[3263]: NETFILTER_CFG table=nat:90 family=2 entries=94 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.716000 audit[3263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffdec71cd0 a2=0 a3=ffffa331f6c0 items=0 ppid=2194 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.773473 kernel: audit: type=1325 audit(1707765649.716:733): table=nat:90 family=2 entries=94 op=nft_register_rule pid=3263 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.773598 kernel: audit: type=1300 audit(1707765649.716:733): arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffdec71cd0 a2=0 a3=ffffa331f6c0 items=0 ppid=2194 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.773735 kubelet[1904]: E0212 19:20:49.773700 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:49.773990 kubelet[1904]: I0212 19:20:49.773880 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rnz82\" (UniqueName: \"kubernetes.io/projected/49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7-kube-api-access-rnz82\") pod \"nfs-server-provisioner-0\" (UID: \"49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7\") " pod="default/nfs-server-provisioner-0" Feb 12 19:20:49.773990 kubelet[1904]: I0212 19:20:49.773942 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7-data\") pod \"nfs-server-provisioner-0\" (UID: \"49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7\") " pod="default/nfs-server-provisioner-0" Feb 12 19:20:49.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.788102 kernel: audit: type=1327 audit(1707765649.716:733): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.803000 audit[3291]: NETFILTER_CFG table=filter:91 family=2 entries=30 op=nft_register_rule pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.803000 audit[3291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffcc006ec0 a2=0 a3=ffffb64256c0 items=0 ppid=2194 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.846561 kernel: audit: type=1325 audit(1707765649.803:734): table=filter:91 family=2 entries=30 op=nft_register_rule pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.846670 kernel: audit: type=1300 audit(1707765649.803:734): arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffcc006ec0 a2=0 a3=ffffb64256c0 items=0 ppid=2194 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.846701 kernel: audit: type=1327 audit(1707765649.803:734): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.803000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.804000 audit[3291]: NETFILTER_CFG table=nat:92 family=2 entries=94 op=nft_register_rule pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.874375 kernel: audit: type=1325 audit(1707765649.804:735): table=nat:92 family=2 entries=94 op=nft_register_rule pid=3291 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.804000 audit[3291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffcc006ec0 a2=0 a3=ffffb64256c0 items=0 ppid=2194 pid=3291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.989824 env[1349]: time="2024-02-12T19:20:49.989779544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7,Namespace:default,Attempt:0,}" Feb 12 19:20:50.136722 systemd-networkd[1502]: cali60e51b789ff: Link UP Feb 12 19:20:50.150098 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:20:50.150191 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:20:50.151751 systemd-networkd[1502]: cali60e51b789ff: Gained carrier Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.065 [INFO][3293] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default 49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7 1282 0 2024-02-12 19:20:49 +0000 UTC map[app:nfs-server-provisioner chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.12 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.065 [INFO][3293] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.088 [INFO][3306] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" HandleID="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.106 [INFO][3306] ipam_plugin.go 268: Auto assigning IP ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" HandleID="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:20:50.087985621 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.106 [INFO][3306] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.106 [INFO][3306] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.106 [INFO][3306] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.107 [INFO][3306] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.112 [INFO][3306] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.116 [INFO][3306] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.118 [INFO][3306] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.120 [INFO][3306] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.120 [INFO][3306] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.121 [INFO][3306] ipam.go 1682: Creating new handle: k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4 Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.124 [INFO][3306] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.130 [INFO][3306] ipam.go 1216: Successfully claimed IPs: [192.168.119.3/26] block=192.168.119.0/26 handle="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.130 [INFO][3306] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.3/26] handle="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" host="10.200.20.12" Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.130 [INFO][3306] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:20:50.162138 env[1349]: 2024-02-12 19:20:50.130 [INFO][3306] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.3/26] IPv6=[] ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" HandleID="k8s-pod-network.c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162808 env[1349]: 2024-02-12 19:20:50.132 [INFO][3293] k8s.go 385: Populated endpoint ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7", ResourceVersion:"1282", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:50.162808 env[1349]: 2024-02-12 19:20:50.132 [INFO][3293] k8s.go 386: Calico CNI using IPs: [192.168.119.3/32] ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162808 env[1349]: 2024-02-12 19:20:50.132 [INFO][3293] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162808 env[1349]: 2024-02-12 19:20:50.151 [INFO][3293] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.162969 env[1349]: 2024-02-12 19:20:50.151 [INFO][3293] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7", ResourceVersion:"1282", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"1e:8a:eb:1b:19:af", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:20:50.162969 env[1349]: 2024-02-12 19:20:50.157 [INFO][3293] k8s.go 491: Wrote updated endpoint to datastore ContainerID="c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:20:50.181986 env[1349]: time="2024-02-12T19:20:50.181916924Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:20:50.181986 env[1349]: time="2024-02-12T19:20:50.181955844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:20:50.182162 env[1349]: time="2024-02-12T19:20:50.181966324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:20:50.182162 env[1349]: time="2024-02-12T19:20:50.182065004Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4 pid=3337 runtime=io.containerd.runc.v2 Feb 12 19:20:50.185000 audit[3333]: NETFILTER_CFG table=filter:93 family=2 entries=44 op=nft_register_chain pid=3333 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:20:50.185000 audit[3333]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22352 a0=3 a1=ffffe9884cb0 a2=0 a3=ffff8c2e5fa8 items=0 ppid=2592 pid=3333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.185000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:20:50.199406 systemd[1]: Started cri-containerd-c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4.scope. Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.212000 audit: BPF prog-id=103 op=LOAD Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3337 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643832343662626632653063336265643563663466316139333931 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3337 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643832343662626632653063336265643563663466316139333931 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.213000 audit: BPF prog-id=104 op=LOAD Feb 12 19:20:50.213000 audit[3347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3337 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643832343662626632653063336265643563663466316139333931 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.214000 audit: BPF prog-id=105 op=LOAD Feb 12 19:20:50.214000 audit[3347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3337 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643832343662626632653063336265643563663466316139333931 Feb 12 19:20:50.214000 audit: BPF prog-id=105 op=UNLOAD Feb 12 19:20:50.214000 audit: BPF prog-id=104 op=UNLOAD Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { perfmon } for pid=3347 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit[3347]: AVC avc: denied { bpf } for pid=3347 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:50.215000 audit: BPF prog-id=106 op=LOAD Feb 12 19:20:50.215000 audit[3347]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3337 pid=3347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643832343662626632653063336265643563663466316139333931 Feb 12 19:20:50.235377 env[1349]: time="2024-02-12T19:20:50.235332317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:49f583ae-5ce0-4dd9-b6c5-62a123f0aaf7,Namespace:default,Attempt:0,} returns sandbox id \"c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4\"" Feb 12 19:20:50.236861 env[1349]: time="2024-02-12T19:20:50.236824148Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:20:50.774288 kubelet[1904]: E0212 19:20:50.774231 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:50.886216 systemd[1]: run-containerd-runc-k8s.io-c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4-runc.MKrSrF.mount: Deactivated successfully. Feb 12 19:20:51.775165 kubelet[1904]: E0212 19:20:51.775126 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:51.822451 systemd-networkd[1502]: cali60e51b789ff: Gained IPv6LL Feb 12 19:20:52.776267 kubelet[1904]: E0212 19:20:52.776197 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:53.246368 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2182114602.mount: Deactivated successfully. Feb 12 19:20:53.697210 systemd[1]: run-containerd-runc-k8s.io-c7f73726ad0f4a18014afbd9ea58a1f5621e884b80901f04c697be324941807b-runc.TUVwQW.mount: Deactivated successfully. Feb 12 19:20:53.776938 kubelet[1904]: E0212 19:20:53.776900 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:54.777587 kubelet[1904]: E0212 19:20:54.777519 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:55.276236 env[1349]: time="2024-02-12T19:20:55.276193593Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.283303 env[1349]: time="2024-02-12T19:20:55.283240273Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.289991 env[1349]: time="2024-02-12T19:20:55.289928756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.294864 env[1349]: time="2024-02-12T19:20:55.294818649Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:20:55.295654 env[1349]: time="2024-02-12T19:20:55.295626004Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 12 19:20:55.297887 env[1349]: time="2024-02-12T19:20:55.297852192Z" level=info msg="CreateContainer within sandbox \"c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:20:55.331575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2111343492.mount: Deactivated successfully. Feb 12 19:20:55.347070 env[1349]: time="2024-02-12T19:20:55.347012157Z" level=info msg="CreateContainer within sandbox \"c3d8246bbf2e0c3bed5cf4f1a93911ae25f254f51a27c9411f871fef0ef1cde4\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"4e2c7ec381b3a44da3fe9762b048cfcfccdc5eec95dcb65824cf71182876592c\"" Feb 12 19:20:55.347911 env[1349]: time="2024-02-12T19:20:55.347872952Z" level=info msg="StartContainer for \"4e2c7ec381b3a44da3fe9762b048cfcfccdc5eec95dcb65824cf71182876592c\"" Feb 12 19:20:55.365780 systemd[1]: Started cri-containerd-4e2c7ec381b3a44da3fe9762b048cfcfccdc5eec95dcb65824cf71182876592c.scope. Feb 12 19:20:55.385176 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:20:55.385405 kernel: audit: type=1400 audit(1707765655.378:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.420381 kernel: audit: type=1400 audit(1707765655.378:756): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.440712 kernel: audit: type=1400 audit(1707765655.378:757): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.460060 kernel: audit: type=1400 audit(1707765655.378:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.460199 kernel: audit: type=1400 audit(1707765655.378:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.495779 kernel: audit: type=1400 audit(1707765655.378:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.495872 kernel: audit: type=1400 audit(1707765655.378:761): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.531313 kernel: audit: type=1400 audit(1707765655.378:762): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.549536 kernel: audit: type=1400 audit(1707765655.378:763): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.566766 kernel: audit: type=1400 audit(1707765655.383:764): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.383000 audit: BPF prog-id=107 op=LOAD Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3337 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465326337656333383162336134346461336665393736326230343863 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3337 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465326337656333383162336134346461336665393736326230343863 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.385000 audit: BPF prog-id=108 op=LOAD Feb 12 19:20:55.385000 audit[3408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3337 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465326337656333383162336134346461336665393736326230343863 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.402000 audit: BPF prog-id=109 op=LOAD Feb 12 19:20:55.402000 audit[3408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3337 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465326337656333383162336134346461336665393736326230343863 Feb 12 19:20:55.419000 audit: BPF prog-id=109 op=UNLOAD Feb 12 19:20:55.419000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { perfmon } for pid=3408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit[3408]: AVC avc: denied { bpf } for pid=3408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:20:55.419000 audit: BPF prog-id=110 op=LOAD Feb 12 19:20:55.419000 audit[3408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3337 pid=3408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:55.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465326337656333383162336134346461336665393736326230343863 Feb 12 19:20:55.579620 env[1349]: time="2024-02-12T19:20:55.579385538Z" level=info msg="StartContainer for \"4e2c7ec381b3a44da3fe9762b048cfcfccdc5eec95dcb65824cf71182876592c\" returns successfully" Feb 12 19:20:55.618000 audit[3437]: AVC avc: denied { search } for pid=3437 comm="rpcbind" name="crypto" dev="proc" ino=21796 scontext=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:20:55.618000 audit[3437]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff916ef000 a2=0 a3=0 items=0 ppid=3419 pid=3437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 key=(null) Feb 12 19:20:55.618000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:20:55.656000 audit[3442]: AVC avc: denied { search } for pid=3442 comm="dbus-daemon" name="crypto" dev="proc" ino=21796 scontext=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:20:55.656000 audit[3442]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff8a7ef000 a2=0 a3=0 items=0 ppid=3419 pid=3442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 key=(null) Feb 12 19:20:55.656000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:20:55.658000 audit[3443]: AVC avc: denied { watch } for pid=3443 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c244,c983 tclass=dir permissive=0 Feb 12 19:20:55.658000 audit[3443]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaaae9db3380 a2=2c8 a3=aaaae9d9ea60 items=0 ppid=3419 pid=3443 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 key=(null) Feb 12 19:20:55.658000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:20:55.663000 audit[3444]: AVC avc: denied { read } for pid=3444 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20478 scontext=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:20:55.663000 audit[3444]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff88b7a570 a2=80000 a3=0 items=0 ppid=3419 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 key=(null) Feb 12 19:20:55.663000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:20:55.664000 audit[3444]: AVC avc: denied { search } for pid=3444 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21796 scontext=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:20:55.664000 audit[3444]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff87f0f000 a2=0 a3=0 items=0 ppid=3419 pid=3444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c244,c983 key=(null) Feb 12 19:20:55.664000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:20:55.778198 kubelet[1904]: E0212 19:20:55.778155 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:56.366000 audit[3473]: NETFILTER_CFG table=filter:94 family=2 entries=18 op=nft_register_rule pid=3473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.366000 audit[3473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc7ce1590 a2=0 a3=ffff9c3466c0 items=0 ppid=2194 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.366000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.369000 audit[3473]: NETFILTER_CFG table=nat:95 family=2 entries=178 op=nft_register_chain pid=3473 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.369000 audit[3473]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffc7ce1590 a2=0 a3=ffff9c3466c0 items=0 ppid=2194 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.778545 kubelet[1904]: E0212 19:20:56.778488 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:57.779613 kubelet[1904]: E0212 19:20:57.779578 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:58.779853 kubelet[1904]: E0212 19:20:58.779815 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:20:59.780889 kubelet[1904]: E0212 19:20:59.780855 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:00.781882 kubelet[1904]: E0212 19:21:00.781842 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:01.782815 kubelet[1904]: E0212 19:21:01.782784 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:02.783723 kubelet[1904]: E0212 19:21:02.783689 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:03.784315 kubelet[1904]: E0212 19:21:03.784281 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:04.784727 kubelet[1904]: E0212 19:21:04.784689 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:05.784991 kubelet[1904]: E0212 19:21:05.784958 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:06.785876 kubelet[1904]: E0212 19:21:06.785847 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:07.786830 kubelet[1904]: E0212 19:21:07.786797 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:08.733509 kubelet[1904]: E0212 19:21:08.733473 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:08.787907 kubelet[1904]: E0212 19:21:08.787882 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:09.788380 kubelet[1904]: E0212 19:21:09.788342 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:10.789219 kubelet[1904]: E0212 19:21:10.789176 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:11.789877 kubelet[1904]: E0212 19:21:11.789839 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:12.790761 kubelet[1904]: E0212 19:21:12.790726 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:13.791148 kubelet[1904]: E0212 19:21:13.791115 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:14.791796 kubelet[1904]: E0212 19:21:14.791758 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:15.792597 kubelet[1904]: E0212 19:21:15.792561 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:16.793409 kubelet[1904]: E0212 19:21:16.793360 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:17.793500 kubelet[1904]: E0212 19:21:17.793454 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:18.793994 kubelet[1904]: E0212 19:21:18.793958 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:19.794798 kubelet[1904]: E0212 19:21:19.794765 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:20.273965 kubelet[1904]: I0212 19:21:20.273936 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=-9.223372005580883e+09 pod.CreationTimestamp="2024-02-12 19:20:49 +0000 UTC" firstStartedPulling="2024-02-12 19:20:50.23643823 +0000 UTC m=+62.202518579" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:20:56.330909611 +0000 UTC m=+68.296990040" watchObservedRunningTime="2024-02-12 19:21:20.273892193 +0000 UTC m=+92.239972542" Feb 12 19:21:20.274311 kubelet[1904]: I0212 19:21:20.274289 1904 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:21:20.278736 systemd[1]: Created slice kubepods-besteffort-pod5838acd8_b62f_4eb0_a406_d28d3c72a34a.slice. Feb 12 19:21:20.395844 kubelet[1904]: I0212 19:21:20.395812 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-da32ddda-bcf6-462d-8469-5b93baf76d68\" (UniqueName: \"kubernetes.io/nfs/5838acd8-b62f-4eb0-a406-d28d3c72a34a-pvc-da32ddda-bcf6-462d-8469-5b93baf76d68\") pod \"test-pod-1\" (UID: \"5838acd8-b62f-4eb0-a406-d28d3c72a34a\") " pod="default/test-pod-1" Feb 12 19:21:20.396004 kubelet[1904]: I0212 19:21:20.395854 1904 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lwwzw\" (UniqueName: \"kubernetes.io/projected/5838acd8-b62f-4eb0-a406-d28d3c72a34a-kube-api-access-lwwzw\") pod \"test-pod-1\" (UID: \"5838acd8-b62f-4eb0-a406-d28d3c72a34a\") " pod="default/test-pod-1" Feb 12 19:21:20.612628 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:21:20.612832 kernel: audit: type=1400 audit(1707765680.584:780): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.612874 kernel: Failed to create system directory netfs Feb 12 19:21:20.584000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.646290 kernel: Failed to create system directory netfs Feb 12 19:21:20.646393 kernel: audit: type=1400 audit(1707765680.584:780): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.646450 kernel: Failed to create system directory netfs Feb 12 19:21:20.584000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.584000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.674666 kernel: audit: type=1400 audit(1707765680.584:780): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.674764 kernel: Failed to create system directory netfs Feb 12 19:21:20.584000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.699231 kernel: audit: type=1400 audit(1707765680.584:780): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.584000 audit[3507]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1baf5e0 a1=12c14 a2=aaaac436e028 a3=aaaae1ba0010 items=0 ppid=1479 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.726331 kernel: audit: type=1300 audit(1707765680.584:780): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1baf5e0 a1=12c14 a2=aaaac436e028 a3=aaaae1ba0010 items=0 ppid=1479 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.584000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:20.736386 kernel: audit: type=1327 audit(1707765680.584:780): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.772404 kernel: Failed to create system directory fscache Feb 12 19:21:20.772534 kernel: audit: type=1400 audit(1707765680.743:781): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.772560 kernel: Failed to create system directory fscache Feb 12 19:21:20.772583 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.781533 kernel: audit: type=1400 audit(1707765680.743:781): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.781625 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.801982 kernel: audit: type=1400 audit(1707765680.743:781): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.802180 kubelet[1904]: E0212 19:21:20.802149 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:20.827404 kernel: Failed to create system directory fscache Feb 12 19:21:20.827514 kernel: audit: type=1400 audit(1707765680.743:781): avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.832536 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.862547 kernel: Failed to create system directory fscache Feb 12 19:21:20.862612 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.872161 kernel: Failed to create system directory fscache Feb 12 19:21:20.872288 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.881540 kernel: Failed to create system directory fscache Feb 12 19:21:20.881641 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.890606 kernel: Failed to create system directory fscache Feb 12 19:21:20.890660 kernel: Failed to create system directory fscache Feb 12 19:21:20.743000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.898063 kernel: FS-Cache: Loaded Feb 12 19:21:20.743000 audit[3507]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1dc2210 a1=4c344 a2=aaaac436e028 a3=aaaae1ba0010 items=0 ppid=1479 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.743000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.977129 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.977199 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.977223 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.986119 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.986178 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.995078 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.995150 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.004667 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.004724 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.013593 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.013645 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.022283 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.026555 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.030732 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.030803 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.039059 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.043407 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.043456 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.051840 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.051889 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.060078 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.060178 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.070571 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.070660 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.079125 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.079238 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.086281 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.095024 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.095118 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.103136 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.103231 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.113157 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.113271 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.121097 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.121193 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.129423 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.129538 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.138286 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.138360 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.146771 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.146842 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.154167 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.154235 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.163309 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.163365 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.171194 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.171260 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.179301 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.179370 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.183342 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.192502 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.192597 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.202903 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.208321 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.212149 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.212199 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.220089 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.220152 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.228270 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.228352 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.236048 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.236099 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.243717 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.243786 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.252796 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.257386 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.261666 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.261727 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.269347 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.269418 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.276826 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.276887 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.284625 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.284678 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.292006 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.292058 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.300946 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.301009 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.309555 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.309614 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.317283 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.317338 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.324760 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.324809 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.332286 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.332342 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.339757 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.339803 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.347202 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.347265 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.354712 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.354782 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.364384 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.364521 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.372542 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.372580 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.380891 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.380947 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.388497 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.388562 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.396010 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.399710 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.399755 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.407139 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.407195 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.416227 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.420311 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.420374 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.424199 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.432045 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.432112 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.439557 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.439628 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.445403 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.459787 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.464806 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.464864 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.473052 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.473101 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.476933 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.480726 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.488369 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.488429 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.492161 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.499678 kernel: Failed to create system directory sunrpc Feb 12 19:21:21.499729 kernel: Failed to create system directory sunrpc Feb 12 19:21:20.962000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.515452 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:21:21.515589 kernel: RPC: Registered udp transport module. Feb 12 19:21:21.515648 kernel: RPC: Registered tcp transport module. Feb 12 19:21:21.524135 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:21:20.962000 audit[3507]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1e0e560 a1=fbb6c a2=aaaac436e028 a3=aaaae1ba0010 items=6 ppid=1479 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.962000 audit: CWD cwd="/" Feb 12 19:21:20.962000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PATH item=1 name=(null) inode=23044 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PATH item=2 name=(null) inode=23044 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PATH item=3 name=(null) inode=23045 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PATH item=4 name=(null) inode=23044 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PATH item=5 name=(null) inode=23046 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:21:20.962000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.630702 kernel: Failed to create system directory nfs Feb 12 19:21:21.630771 kernel: Failed to create system directory nfs Feb 12 19:21:21.630797 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.634313 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.641578 kernel: Failed to create system directory nfs Feb 12 19:21:21.641615 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.648967 kernel: Failed to create system directory nfs Feb 12 19:21:21.649044 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.656318 kernel: Failed to create system directory nfs Feb 12 19:21:21.656367 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.664483 kernel: Failed to create system directory nfs Feb 12 19:21:21.664530 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.672624 kernel: Failed to create system directory nfs Feb 12 19:21:21.672657 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.680902 kernel: Failed to create system directory nfs Feb 12 19:21:21.680957 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.688044 kernel: Failed to create system directory nfs Feb 12 19:21:21.688108 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.695751 kernel: Failed to create system directory nfs Feb 12 19:21:21.695812 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.703312 kernel: Failed to create system directory nfs Feb 12 19:21:21.703345 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.712046 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.716045 kernel: Failed to create system directory nfs Feb 12 19:21:21.716169 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.719799 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.726965 kernel: Failed to create system directory nfs Feb 12 19:21:21.727040 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.734571 kernel: Failed to create system directory nfs Feb 12 19:21:21.734626 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.741902 kernel: Failed to create system directory nfs Feb 12 19:21:21.741930 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.749021 kernel: Failed to create system directory nfs Feb 12 19:21:21.749050 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.756860 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.761368 kernel: Failed to create system directory nfs Feb 12 19:21:21.761396 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.768604 kernel: Failed to create system directory nfs Feb 12 19:21:21.768670 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.776061 kernel: Failed to create system directory nfs Feb 12 19:21:21.776100 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.779700 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.787763 kernel: Failed to create system directory nfs Feb 12 19:21:21.787833 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.794944 kernel: Failed to create system directory nfs Feb 12 19:21:21.795003 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.802147 kernel: Failed to create system directory nfs Feb 12 19:21:21.802214 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.803263 kubelet[1904]: E0212 19:21:21.803203 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.811357 kernel: Failed to create system directory nfs Feb 12 19:21:21.811417 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.815308 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.822841 kernel: Failed to create system directory nfs Feb 12 19:21:21.822898 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.830069 kernel: Failed to create system directory nfs Feb 12 19:21:21.830116 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.837303 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.841261 kernel: Failed to create system directory nfs Feb 12 19:21:21.841302 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.618000 audit[3507]: AVC avc: denied { confidentiality } for pid=3507 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.848652 kernel: Failed to create system directory nfs Feb 12 19:21:21.618000 audit[3507]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaae1f3ab40 a1=ae35c a2=aaaac436e028 a3=aaaae1ba0010 items=0 ppid=1479 pid=3507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:21.618000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:21:21.862342 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.970681 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.970775 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.974863 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.978980 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.982972 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.986751 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.990552 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.995032 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.999101 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.002973 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.006899 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.011612 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.015610 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.019498 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.023769 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.027877 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.033028 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.033998 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.040777 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.040839 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.048193 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.048278 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.055982 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.056037 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.064721 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.064805 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.072604 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.072683 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.081427 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.081483 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.089654 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.089690 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.097155 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.097276 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.100717 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.108867 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.108942 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.116267 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.116315 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.125315 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.125377 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.134509 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.134544 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.142265 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.142301 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.149471 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.149529 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.158193 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.158269 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.165691 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.165725 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.172885 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.172939 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.181780 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.186062 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.186112 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.193221 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.193288 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.196857 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.206178 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.206321 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.209993 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.213609 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.217446 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.221051 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.224606 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.228162 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.231914 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.239413 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.239464 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.247017 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.247101 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.250552 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.254123 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.257678 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.261931 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.269204 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.269271 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.276333 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.276364 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.280108 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.283769 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.291314 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.291379 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.298703 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.298828 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.302340 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.305918 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.310226 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.317461 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.317495 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.324806 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.324868 kernel: Failed to create system directory nfs4 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:21.955000 audit[3513]: AVC avc: denied { confidentiality } for pid=3513 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.332130 kernel: Failed to create system directory nfs4 Feb 12 19:21:22.442859 kernel: NFS: Registering the id_resolver key type Feb 12 19:21:22.443003 kernel: Key type id_resolver registered Feb 12 19:21:22.443036 kernel: Key type id_legacy registered Feb 12 19:21:21.955000 audit[3513]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffa4b2b010 a1=167c04 a2=aaaad1cfe028 a3=aaab038fc010 items=0 ppid=1479 pid=3513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:21.955000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.462712 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.462823 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.462843 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.467086 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.471440 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.475605 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.484126 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.484222 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.492125 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.492171 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.501207 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.501298 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.511048 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.511104 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.520450 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.520535 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.528528 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.528583 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.532571 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.536565 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.544324 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.544398 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.552808 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.552922 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.556950 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.563296 kernel: Failed to create system directory rpcgss Feb 12 19:21:22.451000 audit[3514]: AVC avc: denied { confidentiality } for pid=3514 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:21:22.451000 audit[3514]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffff81c43010 a1=3e09c a2=aaaad64be028 a3=aaab0424e010 items=0 ppid=1479 pid=3514 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:22.451000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:21:22.803587 kubelet[1904]: E0212 19:21:22.803439 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:22.978945 nfsidmap[3523]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-96528754ae' Feb 12 19:21:22.996214 nfsidmap[3524]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-96528754ae' Feb 12 19:21:23.005000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.005000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.005000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.006000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.006000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a667ee0 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.006000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:23.006000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.006000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a667ee0 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.006000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:23.006000 audit[1456]: AVC avc: denied { watch_reads } for pid=1456 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2747 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:21:23.006000 audit[1456]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaab0a667ee0 a2=10 a3=0 items=0 ppid=1 pid=1456 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.006000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:21:23.282843 env[1349]: time="2024-02-12T19:21:23.282453732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5838acd8-b62f-4eb0-a406-d28d3c72a34a,Namespace:default,Attempt:0,}" Feb 12 19:21:23.430662 systemd-networkd[1502]: cali5ec59c6bf6e: Link UP Feb 12 19:21:23.441972 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:21:23.442101 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:21:23.444498 systemd-networkd[1502]: cali5ec59c6bf6e: Gained carrier Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.364 [INFO][3529] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-test--pod--1-eth0 default 5838acd8-b62f-4eb0-a406-d28d3c72a34a 1380 0 2024-02-12 19:20:50 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.364 [INFO][3529] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.386 [INFO][3540] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" HandleID="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Workload="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.401 [INFO][3540] ipam_plugin.go 268: Auto assigning IP ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" HandleID="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Workload="10.200.20.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bc7c0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"test-pod-1", "timestamp":"2024-02-12 19:21:23.386106866 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.401 [INFO][3540] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.402 [INFO][3540] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.402 [INFO][3540] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.403 [INFO][3540] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.406 [INFO][3540] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.409 [INFO][3540] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.410 [INFO][3540] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.412 [INFO][3540] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.413 [INFO][3540] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.414 [INFO][3540] ipam.go 1682: Creating new handle: k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.417 [INFO][3540] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.424 [INFO][3540] ipam.go 1216: Successfully claimed IPs: [192.168.119.4/26] block=192.168.119.0/26 handle="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.424 [INFO][3540] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.4/26] handle="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" host="10.200.20.12" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.424 [INFO][3540] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.424 [INFO][3540] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.4/26] IPv6=[] ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" HandleID="k8s-pod-network.6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Workload="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.426 [INFO][3529] k8s.go 385: Populated endpoint ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5838acd8-b62f-4eb0-a406-d28d3c72a34a", ResourceVersion:"1380", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:23.451861 env[1349]: 2024-02-12 19:21:23.426 [INFO][3529] k8s.go 386: Calico CNI using IPs: [192.168.119.4/32] ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.453524 env[1349]: 2024-02-12 19:21:23.426 [INFO][3529] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.453524 env[1349]: 2024-02-12 19:21:23.445 [INFO][3529] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.453524 env[1349]: 2024-02-12 19:21:23.445 [INFO][3529] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"5838acd8-b62f-4eb0-a406-d28d3c72a34a", ResourceVersion:"1380", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 20, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"66:6e:1c:e0:bf:c4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:21:23.453524 env[1349]: 2024-02-12 19:21:23.450 [INFO][3529] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:21:23.466000 audit[3560]: NETFILTER_CFG table=filter:96 family=2 entries=34 op=nft_register_chain pid=3560 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:21:23.466000 audit[3560]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17876 a0=3 a1=ffffc8636970 a2=0 a3=ffff97b08fa8 items=0 ppid=2592 pid=3560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.466000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:21:23.472277 env[1349]: time="2024-02-12T19:21:23.472175266Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:21:23.472479 env[1349]: time="2024-02-12T19:21:23.472453665Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:21:23.472574 env[1349]: time="2024-02-12T19:21:23.472553224Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:21:23.472965 env[1349]: time="2024-02-12T19:21:23.472919423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c pid=3569 runtime=io.containerd.runc.v2 Feb 12 19:21:23.490239 systemd[1]: Started cri-containerd-6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c.scope. Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit: BPF prog-id=111 op=LOAD Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3569 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666313265646165303765666661323431373161303766646238373732 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3569 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666313265646165303765666661323431373161303766646238373732 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.501000 audit: BPF prog-id=112 op=LOAD Feb 12 19:21:23.501000 audit[3580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3569 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.501000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666313265646165303765666661323431373161303766646238373732 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.502000 audit: BPF prog-id=113 op=LOAD Feb 12 19:21:23.502000 audit[3580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3569 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666313265646165303765666661323431373161303766646238373732 Feb 12 19:21:23.504000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:21:23.504000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { perfmon } for pid=3580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit[3580]: AVC avc: denied { bpf } for pid=3580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.504000 audit: BPF prog-id=114 op=LOAD Feb 12 19:21:23.504000 audit[3580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3569 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666313265646165303765666661323431373161303766646238373732 Feb 12 19:21:23.523375 env[1349]: time="2024-02-12T19:21:23.523323915Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:5838acd8-b62f-4eb0-a406-d28d3c72a34a,Namespace:default,Attempt:0,} returns sandbox id \"6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c\"" Feb 12 19:21:23.525426 env[1349]: time="2024-02-12T19:21:23.525391587Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:21:23.803749 kubelet[1904]: E0212 19:21:23.803702 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:23.884170 env[1349]: time="2024-02-12T19:21:23.884110252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:23.892566 env[1349]: time="2024-02-12T19:21:23.892515941Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:23.896835 env[1349]: time="2024-02-12T19:21:23.896797885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:23.903742 env[1349]: time="2024-02-12T19:21:23.903694219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:21:23.904233 env[1349]: time="2024-02-12T19:21:23.904202857Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:21:23.906217 env[1349]: time="2024-02-12T19:21:23.906175810Z" level=info msg="CreateContainer within sandbox \"6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:21:23.948879 env[1349]: time="2024-02-12T19:21:23.948830451Z" level=info msg="CreateContainer within sandbox \"6f12edae07effa24171a07fdb87729e45445a270c46a2a0f88ab0f6ac51f2c1c\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"9b0d2d6d35a034264b0f40a16975dd72d3a4d6474a2f0b7d7b059eff36f49c1d\"" Feb 12 19:21:23.949755 env[1349]: time="2024-02-12T19:21:23.949727528Z" level=info msg="StartContainer for \"9b0d2d6d35a034264b0f40a16975dd72d3a4d6474a2f0b7d7b059eff36f49c1d\"" Feb 12 19:21:23.964882 systemd[1]: Started cri-containerd-9b0d2d6d35a034264b0f40a16975dd72d3a4d6474a2f0b7d7b059eff36f49c1d.scope. Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit: BPF prog-id=115 op=LOAD Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c7b38 a2=10 a3=0 items=0 ppid=3569 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306432643664333561303334323634623066343061313639373564 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c75a0 a2=3c a3=0 items=0 ppid=3569 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306432643664333561303334323634623066343061313639373564 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit: BPF prog-id=116 op=LOAD Feb 12 19:21:23.977000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c78e0 a2=78 a3=0 items=0 ppid=3569 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306432643664333561303334323634623066343061313639373564 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit: BPF prog-id=117 op=LOAD Feb 12 19:21:23.977000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c7670 a2=78 a3=0 items=0 ppid=3569 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306432643664333561303334323634623066343061313639373564 Feb 12 19:21:23.977000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:21:23.977000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { perfmon } for pid=3633 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit[3633]: AVC avc: denied { bpf } for pid=3633 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:23.977000 audit: BPF prog-id=118 op=LOAD Feb 12 19:21:23.977000 audit[3633]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c7b40 a2=78 a3=0 items=0 ppid=3569 pid=3633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:23.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962306432643664333561303334323634623066343061313639373564 Feb 12 19:21:24.018135 env[1349]: time="2024-02-12T19:21:24.018067274Z" level=info msg="StartContainer for \"9b0d2d6d35a034264b0f40a16975dd72d3a4d6474a2f0b7d7b059eff36f49c1d\" returns successfully" Feb 12 19:21:24.373604 kubelet[1904]: I0212 19:21:24.373568 1904 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/test-pod-1" podStartSLOduration=-9.22337200248124e+09 pod.CreationTimestamp="2024-02-12 19:20:50 +0000 UTC" firstStartedPulling="2024-02-12 19:21:23.52480859 +0000 UTC m=+95.490888939" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:21:24.372764608 +0000 UTC m=+96.338844957" watchObservedRunningTime="2024-02-12 19:21:24.373535686 +0000 UTC m=+96.339615995" Feb 12 19:21:24.654463 systemd-networkd[1502]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:21:24.803961 kubelet[1904]: E0212 19:21:24.803912 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:25.804483 kubelet[1904]: E0212 19:21:25.804449 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:26.805541 kubelet[1904]: E0212 19:21:26.805487 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:27.805766 kubelet[1904]: E0212 19:21:27.805732 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:28.732783 kubelet[1904]: E0212 19:21:28.732747 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:28.806366 kubelet[1904]: E0212 19:21:28.806340 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:29.807039 kubelet[1904]: E0212 19:21:29.807005 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:30.807777 kubelet[1904]: E0212 19:21:30.807740 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:31.809185 kubelet[1904]: E0212 19:21:31.809154 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:32.810183 kubelet[1904]: E0212 19:21:32.810142 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:33.811203 kubelet[1904]: E0212 19:21:33.811163 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:34.811397 kubelet[1904]: E0212 19:21:34.811360 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:35.812367 kubelet[1904]: E0212 19:21:35.812337 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:36.813382 kubelet[1904]: E0212 19:21:36.813344 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:37.814365 kubelet[1904]: E0212 19:21:37.814334 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:38.815060 kubelet[1904]: E0212 19:21:38.815006 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:39.815338 kubelet[1904]: E0212 19:21:39.815297 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:40.815660 kubelet[1904]: E0212 19:21:40.815624 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:41.816696 kubelet[1904]: E0212 19:21:41.816660 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:42.817241 kubelet[1904]: E0212 19:21:42.817204 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:42.864015 kubelet[1904]: E0212 19:21:42.863931 1904 controller.go:189] failed to update lease, error: Put "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.12?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 19:21:43.817594 kubelet[1904]: E0212 19:21:43.817557 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:43.975072 kubelet[1904]: E0212 19:21:43.975034 1904 kubelet_node_status.go:540] "Error updating node status, will retry" err="error getting node \"10.200.20.12\": Get \"https://10.200.20.36:6443/api/v1/nodes/10.200.20.12?resourceVersion=0&timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:21:44.818225 kubelet[1904]: E0212 19:21:44.818192 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:45.819191 kubelet[1904]: E0212 19:21:45.819153 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:46.820207 kubelet[1904]: E0212 19:21:46.820171 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:47.820420 kubelet[1904]: E0212 19:21:47.820381 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:48.732894 kubelet[1904]: E0212 19:21:48.732859 1904 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:48.820621 kubelet[1904]: E0212 19:21:48.820587 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:49.821042 kubelet[1904]: E0212 19:21:49.821013 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:50.821701 kubelet[1904]: E0212 19:21:50.821662 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:51.822607 kubelet[1904]: E0212 19:21:51.822580 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:52.823362 kubelet[1904]: E0212 19:21:52.823330 1904 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:21:52.864994 kubelet[1904]: E0212 19:21:52.864943 1904 controller.go:189] failed to update lease, error: Put "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/10.200.20.12?timeout=10s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) Feb 12 19:21:52.868488 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#307 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.868772 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#306 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.868887 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#314 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.889653 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#256 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.917912 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#307 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.918184 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#306 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:52.918329 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#314 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001